Sciweavers

455 search results - page 69 / 91
» Understanding Counterexamples with explain
Sort
View
EUC
2008
Springer
15 years 6 days ago
A Context Management System for Supporting Context-Aware Applications
This paper presents a context management system for supporting context-aware applications in a smart home. In a ubiquitous computing environment context changes dynamically and th...
Eunhoe Kim, Jaeyoung Choi
72
Voted
GECCO
2008
Springer
122views Optimization» more  GECCO 2008»
15 years 6 days ago
Optinformatics for schema analysis of binary genetic algorithms
Given the importance of optimization and informatics which are the two broad fields of research, we present an instance of Optinformatics which denotes the specialization of info...
Minh Nghia Le, Yew-Soon Ong, Quang Huy Nguyen 0001
91
Voted
GECCO
2008
Springer
148views Optimization» more  GECCO 2008»
15 years 6 days ago
Using quotient graphs to model neutrality in evolutionary search
We introduce quotient graphs for modeling neutrality in evolutionary search. We demonstrate that for a variety of evolutionary computing problems, search can be characterized by g...
Dominic Wilson, Devinder Kaur
COGSCI
2010
99views more  COGSCI 2010»
14 years 11 months ago
Learning to Learn Causal Models
Learning to understand a single causal system can be an achievement, but humans must learn about multiple causal systems over the course of a lifetime. We present a hierarchical B...
Charles Kemp, Noah D. Goodman, Joshua B. Tenenbaum
CORR
2010
Springer
110views Education» more  CORR 2010»
14 years 11 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin