Sciweavers

653 search results - page 11 / 131
» The stepping stones project
Sort
View
ICML
2008
IEEE
15 years 10 months ago
Classification using discriminative restricted Boltzmann machines
Recently, many applications for Restricted Boltzmann Machines (RBMs) have been developed for a large variety of learning problems. However, RBMs are usually used as feature extrac...
Hugo Larochelle, Yoshua Bengio
CEC
2009
IEEE
15 years 4 months ago
Comparing parameter tuning methods for evolutionary algorithms
Abstract— Tuning the parameters of an evolutionary algorithm (EA) to a given problem at hand is essential for good algorithm performance. Optimizing parameter values is, however,...
Selmar K. Smit, A. E. Eiben
GCSE
1999
Springer
15 years 1 months ago
Aspect-Oriented Compilers
Aspect-orientedprogramming provides theprogrammer with means to cross-cut conventional program structures, in particular the class hierarchies of object-oriented programming. This ...
Oege de Moor, Simon L. Peyton Jones, Eric Van Wyk
CCS
1993
ACM
15 years 1 months ago
On Simple and Secure Key Distribution
Many recent research e orts in computer security focus on constructing provably secure authentication protocols. Although many of the resulting protocols rely on the a priori secu...
Gene Tsudik, Els Van Herreweghen
AAAI
1998
14 years 10 months ago
Abductive Planning with Sensing
In abductive planning, plans are constructed as reasons for an agent to act: plans are demonstrations in logical theory of action that a goal will result assuming that given actio...
Matthew Stone