We address the problems of identifying malware in network telemetry logs...
The interest in accelerating black-box optimizers has resulted in severa...
Optimization of very expensive black-box functions requires utilization ...
Outline of several strategies for using Gaussian processes as surrogate
...