Sciweavers

2006 search results - page 106 / 402
» Heuristic Security-Testing Methods
Sort
View
99
Voted
CRV
2007
IEEE
101views Robotics» more  CRV 2007»
15 years 4 months ago
Energy Efficient Robot Rendezvous
We examine the problem of finding a single meeting location for a group of heterogeneous autonomous mobile robots, such that the total system cost of traveling to the rendezvous i...
Pawel Zebrowski, Yaroslav Litus, Richard T. Vaugha...
122
Voted
CAV
2009
Springer
163views Hardware» more  CAV 2009»
16 years 1 months ago
Complete Instantiation for Quantified Formulas in Satisfiabiliby Modulo Theories
Quantifier reasoning in Satisfiability Modulo Theories (SMT) is a long-standing challenge. The practical method employed in modern SMT solvers is to instantiate quantified formulas...
Leonardo Mendonça de Moura, Yeting Ge
74
Voted
GECCO
2007
Springer
142views Optimization» more  GECCO 2007»
15 years 6 months ago
Improving global numerical optimization using a search-space reduction algorithm
We have developed an algorithm for reduction of search-space, called Domain Optimization Algorithm (DOA), applied to global optimization. This approach can efficiently eliminate ...
Vinicius Veloso de Melo, Alexandre C. B. Delbem, D...
IJCNN
2006
IEEE
15 years 6 months ago
Generalization Improvement in Multi-Objective Learning
— Several heuristic methods have been suggested for improving the generalization capability in neural network learning, most of which are concerned with a single-objective (SO) l...
Lars Gräning, Yaochu Jin, Bernhard Sendhoff
77
Voted
ACMSE
2006
ACM
15 years 6 months ago
Support vector machines for collaborative filtering
Support Vector Machines (SVMs) have successfully shown efficiencies in many areas such as text categorization. Although recommendation systems share many similarities with text ca...
Zhonghang Xia, Yulin Dong, Guangming Xing