Sciweavers

873 search results - page 113 / 175
» Tournament scoring problem
Sort
View
ACSAC
2003
IEEE
15 years 5 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
SIGIR
2003
ACM
15 years 5 months ago
Structured use of external knowledge for event-based open domain question answering
One of the major problems in question answering (QA) is that the queries are either too brief or often do not contain most relevant terms in the target corpus. In order to overcom...
Hui Yang, Tat-Seng Chua, Shuguang Wang, Chun-Keat ...
AVBPA
2001
Springer
146views Biometrics» more  AVBPA 2001»
15 years 4 months ago
Information Fusion in Biometrics
User verification systems that use a single biometric indicator often have to contend with noisy sensor data, restricted degrees of freedom, non-universality of the biometric tra...
Arun Ross, Anil K. Jain, Jian Zhong Qian
GECCO
2007
Springer
147views Optimization» more  GECCO 2007»
15 years 3 months ago
A comparison of evaluation methods in coevolution
In this research, we compare four different evaluation methods in coevolution on the Majority Function problem. The size of the problem is selected such that an evaluation against...
Ting-Shuo Yo, Edwin D. de Jong
AAAI
2010
15 years 1 months ago
Bypassing Combinatorial Protections: Polynomial-Time Algorithms for Single-Peaked Electorates
For many election systems, bribery (and related) attacks have been shown NP-hard using constructions on combinatorially rich structures such as partitions and covers. It is import...
Felix Brandt, Markus Brill, Edith Hemaspaandra, La...