Sciweavers

526 search results - page 90 / 106
» date 2008
Sort
View
87
Voted
DIMVA
2010
15 years 1 months ago
Organizing Large Scale Hacking Competitions
Computer security competitions and challenges are a way to foster innovation and educate students in a highly-motivating setting. In recent years, a number of different security co...
Nicholas Childers, Bryce Boe, Lorenzo Cavallaro, L...
GECCO
2008
Springer
103views Optimization» more  GECCO 2008»
15 years 1 months ago
How generative encodings fare on less regular problems
Generative representations allow the reuse of code and thus facilitate the evolution of repeated phenotypic themes or modules. It has been shown that generative representations pe...
Jeff Clune, Charles Ofria, Robert T. Pennock
106
Voted
GECCO
2008
Springer
175views Optimization» more  GECCO 2008»
15 years 1 months ago
Non-genetic transmission of memes by diffusion
In recent years, there has been an increase in research activities on Memetic Algorithm (MA). MA works with memes; a meme being defined as “the basic unit of cultural transmiss...
Quang Huy Nguyen 0001, Yew-Soon Ong, Meng-Hiot Lim
93
Voted
AES
2008
Springer
111views Cryptology» more  AES 2008»
15 years 19 days ago
Ambient vibration testing and structural evaluation of an historic suspension footbridge
The paper summarises the ambient vibration-based assessment of an historic suspension footbridge, dating back to 1928. The footbridge is characterised by the timber floor system s...
C. Gentile, N. Gallino
95
Voted
ML
2008
ACM
15 years 13 days ago
A bias/variance decomposition for models using collective inference
Bias/variance analysis is a useful tool for investigating the performance of machine learning algorithms. Conventional analysis decomposes loss into errors due to aspects of the le...
Jennifer Neville, David Jensen