Sciweavers

1045 search results - page 203 / 209
» The Use of Exceptions
Sort
View
97
Voted
CORR
2010
Springer
117views Education» more  CORR 2010»
15 years 16 days ago
Evolution with Drifting Targets
We consider the question of the stability of evolutionary algorithms to gradual changes, or drift, in the target concept. We define an algorithm to be resistant to drift if, for s...
Varun Kanade, Leslie G. Valiant, Jennifer Wortman ...
109
Voted
EC
2010
157views ECommerce» more  EC 2010»
15 years 16 days ago
Memetic Algorithms for Continuous Optimisation Based on Local Search Chains
Memetic algorithms with continuous local search methods have arisen as effective tools to address the difficulty of obtaining reliable solutions of high precision for complex cont...
Daniel Molina, Manuel Lozano, Carlos García...
104
Voted
BMCBI
2006
113views more  BMCBI 2006»
15 years 15 days ago
GibbsST: a Gibbs sampling method for motif discovery with enhanced resistance to local optima
Background: Computational discovery of transcription factor binding sites (TFBS) is a challenging but important problem of bioinformatics. In this study, improvement of a Gibbs sa...
Kazuhito Shida
110
Voted
ENTCS
2006
114views more  ENTCS 2006»
15 years 14 days ago
What is algebraic in process theory?
This is an extended version of an essay with the same title that I wrote for the workshop Algebraic Process Calculi: The First Twenty Five Years and Beyond, held in Bertinoro, Ita...
Bas Luttik
106
Voted
JUCS
2008
149views more  JUCS 2008»
15 years 12 days ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng