Sciweavers

9176 search results - page 1754 / 1836
» algorithms 2010
Sort
View
DCOSS
2010
Springer
15 years 9 months ago
MetroTrack: Predictive Tracking of Mobile Events Using Mobile Phones
We propose to use mobile phones carried by people in their everyday lives as mobile sensors to track mobile events. We argue that sensor-enabled mobile phones are best suited to de...
Gahng-Seop Ahn, Mirco Musolesi, Hong Lu, Reza Olfa...
EUROCRYPT
2010
Springer
15 years 9 months ago
Bounded Key-Dependent Message Security
We construct the first public-key encryption scheme that is proven secure (in the standard model, under standard assumptions) even when the attacker gets access to encryptions of ...
Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval...
GECCO
2010
Springer
191views Optimization» more  GECCO 2010»
15 years 9 months ago
Initialization parameter sweep in ATHENA: optimizing neural networks for detecting gene-gene interactions in the presence of sma
Recent advances in genotyping technology have led to the generation of an enormous quantity of genetic data. Traditional methods of statistical analysis have proved insufficient i...
Emily Rose Holzinger, Carrie C. Buchanan, Scott M....
GECCO
2010
Springer
254views Optimization» more  GECCO 2010»
15 years 9 months ago
Evolving viral marketing strategies
One method of viral marketing involves seeding certain consumers within a population to encourage faster adoption of the product throughout the entire population. However, determi...
Forrest Stonedahl, William Rand, Uri Wilensky
GECCO
2010
Springer
172views Optimization» more  GECCO 2010»
15 years 9 months ago
Designing better fitness functions for automated program repair
Evolutionary methods have been used to repair programs automatically, with promising results. However, the fitness function used to achieve these results was based on a few simpl...
Ethan Fast, Claire Le Goues, Stephanie Forrest, We...
« Prev « First page 1754 / 1836 Last » Next »