Sciweavers

2006 search results - page 2 / 402
» Heuristic Security-Testing Methods
Sort
View
JMLR
2010
225views more  JMLR 2010»
12 years 12 months ago
Hartigan's Method: k-means Clustering without Voronoi
Hartigan's method for k-means clustering is the following greedy heuristic: select a point, and optimally reassign it. This paper develops two other formulations of the heuri...
Matus Telgarsky, Andrea Vattani
JDCTA
2010
135views more  JDCTA 2010»
13 years 1 hour ago
Signal Framing Methods of Automotive Embedded Networked Control System for Bandwidth Consumption Optimization
Parameter (or variable) of automotive embedded networked control system is named as signal. In order to improve system performance and provide more remaining bandwidth for system ...
Jian Hu, Gangyan Li, Yeqiong Song
IJMTM
2011
190views more  IJMTM 2011»
13 years 5 days ago
Exact and heuristic approaches for lot splitting and scheduling on identical parallel machines
: In this paper, we address a lot splitting and scheduling problem existent in a textile factory. The factory we study produces a set of products that are made of, or assembled fro...
Carina Pimentel, Filipe Pereira Alvelos, Antonio D...
CEC
2011
IEEE
12 years 5 months ago
Cost-benefit analysis of using heuristics in ACGP
—Constrained Genetic Programming (CGP) is a method of searching the Genetic Programming search space non-uniformly, giving preferences to certain subspaces according to some heur...
John W. Aleshunas, Cezary Z. Janikow
GECCO
2011
Springer
374views Optimization» more  GECCO 2011»
12 years 8 months ago
A hybrid heuristic approach for solving the generalized traveling salesman problem
The generalized traveling salesman problem (GTSP) is an NPhard problem that extends the classical traveling salesman problem by partitioning the nodes into clusters and looking fo...
Petrica C. Pop, Serban Iordache