Sciweavers

2335 search results - page 432 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
GECCO
2006
Springer
137views Optimization» more  GECCO 2006»
15 years 5 months ago
A method for parameter calibration and relevance estimation in evolutionary algorithms
We present and evaluate a method for estimating the relevance and calibrating the values of parameters of an evolutionary algorithm. The method provides an information theoretic m...
Volker Nannen, A. E. Eiben
CONEXT
2009
ACM
14 years 11 months ago
Lockr: better privacy for social networks
Today's online social networking (OSN) sites do little to protect the privacy of their users' social networking information. Given the highly sensitive nature of the inf...
Amin Tootoonchian, Stefan Saroiu, Yashar Ganjali, ...
MM
2000
ACM
144views Multimedia» more  MM 2000»
15 years 6 months ago
Integrating drawing tools with behavioral modeling in digital painting
Our goal is to integrate traditional artistic media that demand hand dexterity (such as drawing) with intelligent systems techniques that may both constrain and nourish this dexte...
Elpida Tzafestas
ATAL
2004
Springer
15 years 7 months ago
Resource Allocation in the Grid Using Reinforcement Learning
One of the main challenges in Grid computing is efficient allocation of resources (CPU-hours, network bandwidth, etc.) to the tasks submitted by users. Due to the lack of centrali...
Aram Galstyan, Karl Czajkowski, Kristina Lerman
CSCW
2008
ACM
15 years 3 months ago
The microstructures of social tagging: a rational model
This article presents a rational model developed under the distributed cognition framework that explains how social tags influence knowledge acquisition and adaptation in explorat...
Wai-Tat Fu