Sciweavers

2006 search results - page 104 / 402
» Heuristic Security-Testing Methods
Sort
View
124
Voted
EVOW
2012
Springer
13 years 8 months ago
Applying (Hybrid) Metaheuristics to Fuel Consumption Optimization of Hybrid Electric Vehicles
This work deals with the application of metaheuristics to the fuel consumption minimization problem of hybrid electric vehicles (HEV) considering exactly specified driving cycles....
Thorsten Krenek, Mario Ruthmair, Günther R. R...
CVPR
2012
IEEE
13 years 3 months ago
Active image clustering: Seeking constraints from humans to complement algorithms
We propose a method of clustering images that combines algorithmic and human input. An algorithm provides us with pairwise image similarities. We then actively obtain selected, mo...
Arijit Biswas, David W. Jacobs
80
Voted
ECAI
2000
Springer
15 years 5 months ago
Focusing Search by Using Problem Solving Experience
Case-based reasoning (CBR) aims at using experience from the past in order to guide future problem solving rather than “starting from scratch” every time. We propose a CBR stra...
Eyke Hüllermeier
SODA
2000
ACM
96views Algorithms» more  SODA 2000»
15 years 2 months ago
Improved Steiner tree approximation in graphs
The Steiner tree problem in weighted graphs seeks a minimum weight connected subgraph containing a given subset of the vertices terminals. We present a new polynomial-time heurist...
Gabriel Robins, Alexander Zelikovsky
BIOINFORMATICS
2007
88views more  BIOINFORMATICS 2007»
15 years 24 days ago
Maximum likelihood of phylogenetic networks
Horizontal gene transfer (HGT) is believed to be ubiquitous among bacteria, and plays a major role in their genome diversification as well as their ability to develop resistance t...
Guohua Jin, Luay Nakhleh, Sagi Snir, Tamir Tuller