Nome |
# |
Automatic Synthesis of Regular Expressions from Examples, file e2913fd9-bcbc-f688-e053-3705fe0a67e0
|
2.194
|
Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware, file e2913fda-448f-f688-e053-3705fe0a67e0
|
1.101
|
Inference of Regular Expressions for Text Extraction from Examples, file e2913fda-3a23-f688-e053-3705fe0a67e0
|
597
|
Automatic Search-and-Replace From Examples With Coevolutionary Genetic Programming, file e2913fdc-c0a9-f688-e053-3705fe0a67e0
|
536
|
Learning Text Patterns using Separate-and-Conquer Genetic Programming, file e2913fd9-745d-f688-e053-3705fe0a67e0
|
502
|
(In)Secure Configuration Practices of WPA2 Enterprise Supplicants, file e2913fdc-433f-f688-e053-3705fe0a67e0
|
488
|
Your Paper has been Accepted, Rejected, or Whatever: Automatic Generation of Scientific Paper Reviews, file e2913fda-7ea6-f688-e053-3705fe0a67e0
|
482
|
Evolutionary Synthesis of Sensing Controllers for Voxel-based Soft Robots, file e2913fdc-e5f1-f688-e053-3705fe0a67e0
|
460
|
Regex-based Entity Extraction with Active Learning and Genetic Programming, file e2913fda-8779-f688-e053-3705fe0a67e0
|
398
|
Syntactical Similarity Learning by Means of Grammatical Evolution, file e2913fda-809e-f688-e053-3705fe0a67e0
|
295
|
Genetic programming in the twenty-first century: a bibliometric and content-based analysis from both sides of the fence, file e2913fdc-8de5-f688-e053-3705fe0a67e0
|
261
|
Designing automatically a representation for grammatical evolution, file e2913fdc-3a86-f688-e053-3705fe0a67e0
|
248
|
GOMGE: Gene-Pool Optimal Mixing on Grammatical Evolution, file e2913fdc-4c94-f688-e053-3705fe0a67e0
|
241
|
Visualizing the outcome of dynamic analysis of Android malware with VizMal, file e2913fdd-34e8-f688-e053-3705fe0a67e0
|
240
|
Data Quality Challenge: Toward a Tool for String Processing by Examples, file e2913fd9-b17c-f688-e053-3705fe0a67e0
|
233
|
Personalized, Browser-Based Visual Phishing Detection Based on Deep Learning, file e2913fdc-c43c-f688-e053-3705fe0a67e0
|
233
|
How Phishing Pages Look Like?, file e2913fdc-6637-f688-e053-3705fe0a67e0
|
210
|
Can a Machine Replace Humans in Building Regular Expressions? A Case Study, file e2913fda-be82-f688-e053-3705fe0a67e0
|
207
|
Understanding airline behaviours on trajectory choices through opendata, file e2913fdc-7f21-f688-e053-3705fe0a67e0
|
195
|
A Security-Oriented Analysis of Web Inclusions in the Italian Public Administration, file e2913fdc-65f3-f688-e053-3705fe0a67e0
|
185
|
Evolutionary Synthesis of Sensing Controllers for Voxel-based Soft Robots, file e2913fdc-b1b8-f688-e053-3705fe0a67e0
|
140
|
Active Learning of Regular Expressions for Entity Extraction, file e2913fde-e9c0-f688-e053-3705fe0a67e0
|
131
|
An Author Verification Approach Based on Differential Features, file e2913fd9-b2b7-f688-e053-3705fe0a67e0
|
123
|
Mechanisms of Social Learning in Evolved Artificial Life, file e2913fdd-764c-f688-e053-3705fe0a67e0
|
109
|
An Author Profiling Approach Based on Language-dependent Content and Stylometric Features, file e2913fd9-b2b9-f688-e053-3705fe0a67e0
|
99
|
On the Automatic Construction of Regular Expressions from Examples (GP vs. Humans 1-0), file e2913fda-7273-f688-e053-3705fe0a67e0
|
98
|
Multi-level diversity promotion strategies for Grammar-guided Genetic Programming, file e2913fdc-a7f3-f688-e053-3705fe0a67e0
|
97
|
2D-VSR-Sim: A simulation tool for the optimization of 2-D voxel-based soft robots, file e2913fdd-7647-f688-e053-3705fe0a67e0
|
80
|
Predicting the effectiveness of pattern-based entity extractor inference, file e2913fda-77b1-f688-e053-3705fe0a67e0
|
70
|
Model learning with personalized interpretability estimation (ML-PIE), file e2913fde-7439-f688-e053-3705fe0a67e0
|
67
|
An Evolutionary Computation Approach for Twitter Bot Detection, file e2913fdf-7fc2-f688-e053-3705fe0a67e0
|
61
|
Understanding airline behaviours on trajectory choices through opendata, file e2913fdc-77ec-f688-e053-3705fe0a67e0
|
59
|
Regex-based Entity Extraction with Active Learning and Genetic Programming, file e2913fda-877a-f688-e053-3705fe0a67e0
|
57
|
Communication in Decision Making: Competition favors Inequality, file e2913fdd-7650-f688-e053-3705fe0a67e0
|
48
|
On the Impact of the Rules on Autonomous Drive Learning, file e2913fdd-aa1e-f688-e053-3705fe0a67e0
|
44
|
Discrimination of quarry blasts from earthquakes using artificial neural networks, file e2913fde-6440-f688-e053-3705fe0a67e0
|
38
|
Trajectory Clustering for Air Traffic Categorisation, file e2913fdf-60ee-f688-e053-3705fe0a67e0
|
37
|
Learning a formula of interpretability to learn interpretable formulas, file e2913fde-15f7-f688-e053-3705fe0a67e0
|
32
|
Interactive Example-based Finding of Text Items, file e2913fdd-74a8-f688-e053-3705fe0a67e0
|
31
|
Generative adversarial networks for generating synthetic features for Wi-Fi signal quality, file e2913fde-cae7-f688-e053-3705fe0a67e0
|
27
|
Identification of Near Fault Pulse Shaped Signals With Machine Learning Algorithms, file e2913fdc-96ed-f688-e053-3705fe0a67e0
|
25
|
On the Impact of the Rules on Autonomous Drive Learning, file e2913fdd-8f1e-f688-e053-3705fe0a67e0
|
20
|
Identification of Near-Fault Impulsive Signals and Their Initiation and Termination Positions with Convolutional Neural Networks, file e2913fde-e1da-f688-e053-3705fe0a67e0
|
13
|
Evolution of Walsh Transforms with Genetic Programming, file cc7debf8-0d1e-4e7c-85ae-df57d60adb61
|
8
|
Discovering Non-Linear Boolean Functions by Evolving Walsh Transforms with Genetic Programming, file 20d497c3-dcc0-4cef-9bca-de78fdce043e
|
6
|
An analysis of the ingredients for learning interpretable symbolic regression models with human-in-the-loop and genetic programming, file c3c0ffb3-e7b9-4028-95c0-efeb9d369fcb
|
6
|
Examining the Role of Incentives in Scholarly Publishing with Multi-Agent Reinforcement Learning, file 37d5a8db-1967-4195-921c-02acb0a32387
|
5
|
Predicting the effectiveness of pattern-based entity extractor inference, file e2913fda-6996-f688-e053-3705fe0a67e0
|
5
|
Active Learning of Regular Expressions for Entity Extraction, file e2913fdb-31ef-f688-e053-3705fe0a67e0
|
5
|
Evolutionary Learning of Syntax Patterns for Genic Interaction Extraction, file e2913fd9-903e-f688-e053-3705fe0a67e0
|
4
|
Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware, file e2913fda-7dbc-f688-e053-3705fe0a67e0
|
4
|
Enterprise wi-fi: we need devices that are secure by default, file e2913fdc-b3ba-f688-e053-3705fe0a67e0
|
4
|
Automatic Search-and-Replace From Examples With Coevolutionary Genetic Programming, file e2913fde-5122-f688-e053-3705fe0a67e0
|
4
|
Automatic Synthesis of Regular Expressions from Examples, file e2913fd9-bd1d-f688-e053-3705fe0a67e0
|
3
|
Active learning approaches for learning regular expressions with genetic programming, file e2913fda-62ae-f688-e053-3705fe0a67e0
|
3
|
On the Automatic Construction of Regular Expressions from Examples (GP vs. Humans 1-0), file e2913fda-7928-f688-e053-3705fe0a67e0
|
3
|
GOMGE: Gene-Pool Optimal Mixing on Grammatical Evolution, file e2913fdc-40cf-f688-e053-3705fe0a67e0
|
3
|
Multi-level diversity promotion strategies for Grammar-guided Genetic Programming, file e2913fdc-6e73-f688-e053-3705fe0a67e0
|
3
|
Syntactical Similarity Learning by Means of Grammatical Evolution, file e2913fda-91b3-f688-e053-3705fe0a67e0
|
2
|
Can a Machine Replace Humans in Building Regular Expressions? A Case Study, file e2913fda-b440-f688-e053-3705fe0a67e0
|
2
|
Designing automatically a representation for grammatical evolution, file e2913fdc-3a87-f688-e053-3705fe0a67e0
|
2
|
Exploring the application of GOMEA to bit-string GE, file e2913fdc-3b7b-f688-e053-3705fe0a67e0
|
2
|
An analysis of dimensionality reduction techniques for visualizing evolution, file e2913fdc-c0a6-f688-e053-3705fe0a67e0
|
2
|
Evolution of distributed neural controllers for voxel-based soft robots, file e2913fdd-a8ab-f688-e053-3705fe0a67e0
|
2
|
Examining the Role of Incentives in Scholarly Publishing with Multi-Agent Reinforcement Learning, file 4d289756-4cae-4a3a-b505-7bd0128d7d73
|
1
|
Evolution of Walsh Transforms with Genetic Programming, file 7ac75c91-08c7-4a4d-9f2c-57089332d40f
|
1
|
Cellular geometric semantic genetic programming, file be8a6cfe-1d63-4172-86fd-42d94cb3cd3f
|
1
|
Data Quality Challenge: Toward a Tool for String Processing by Examples, file e2913fd9-b24a-f688-e053-3705fe0a67e0
|
1
|
Your Paper has been Accepted, Rejected, or Whatever: Automatic Generation of Scientific Paper Reviews, file e2913fda-820d-f688-e053-3705fe0a67e0
|
1
|
Active learning approaches for learning regular expressions with genetic programming, file e2913fda-841c-f688-e053-3705fe0a67e0
|
1
|
(In)Secure Configuration Practices of WPA2 Enterprise Supplicants, file e2913fdc-479b-f688-e053-3705fe0a67e0
|
1
|
Back To The Basics: Security of Software Downloads for Smart Objects, file e2913fdc-6820-f688-e053-3705fe0a67e0
|
1
|
Genetic programming in the twenty-first century: a bibliometric and content-based analysis from both sides of the fence, file e2913fdc-8de6-f688-e053-3705fe0a67e0
|
1
|
Active Learning of Predefined Models for Information Extraction: Selecting Regular Expressions from Examples, file e2913fdd-0879-f688-e053-3705fe0a67e0
|
1
|
Visualizing the outcome of dynamic analysis of Android malware with VizMal, file e2913fdd-34e9-f688-e053-3705fe0a67e0
|
1
|
Inference of Regular Expressions for Text Extraction from Examples, file e2913fde-0053-f688-e053-3705fe0a67e0
|
1
|
Totale |
10.902 |