Sciweavers

5722 search results - page 153 / 1145
» Security Function Interactions
Sort
View
GECCO
2003
Springer
109views Optimization» more  GECCO 2003»
15 years 5 months ago
Real Royal Road Functions for Constant Population Size
Evolutionary and genetic algorithms (EAs and GAs) are quite successful randomized function optimizers. This success is mainly based on the interaction of different operators like ...
Tobias Storch, Ingo Wegener
95
Voted
ICGA
1993
157views Optimization» more  ICGA 1993»
15 years 2 months ago
Optimal Interaction of Mutation and Crossover in the Breeder Genetic Algorithm
The dynamic behavior of mutation and crossover is investigated with the Breeder Genetic Algorithm. The main emphasis is on binary functions. The genetic operators are compared nea...
Heinz Mühlenbein, Dirk Schlierkamp-Voosen
VIS
2008
IEEE
120views Visualization» more  VIS 2008»
16 years 1 months ago
Size-based Transfer Functions: A New Volume Exploration Technique
The visualization of complex 3D images remains a challenge, a fact that is magnified by the difficulty to classify or segment volume data. In this paper, we introduce size-based tr...
Carlos D. Correa, Kwan-Liu Ma
96
Voted
CHI
2007
ACM
16 years 1 months ago
Appropriation of a MMS-based comic creator: from system functionalities to resources for action
Technologies can be used ? or appropriated ? in different ways by different users, but how do the use patterns evolve, and how can design facilitate such evolution? This paper app...
Antti Salovaara
ICCHP
2004
Springer
15 years 6 months ago
Neuropsychological Function for Accessibility of Computer Program for People with Mental Retardation
The extent to which people with mental retardation are benefit from the modern information technology is not well explored. A better understanding on ways that the existing human-c...
Alex W. W. Wong, Chetwyn C. H. Chan, Cecilia W. P....