Sciweavers

2006 search results - page 108 / 402
» Heuristic Security-Testing Methods
Sort
View
106
Voted
CC
2006
Springer
132views System Software» more  CC 2006»
15 years 4 months ago
Register Allocation for Programs in SSA-Form
As register allocation is one of the most important phases in optimizing compilers, much work has been done to improve its quality and speed. We present a novel register allocation...
Sebastian Hack, Daniel Grund, Gerhard Goos
GECCO
2006
Springer
173views Optimization» more  GECCO 2006»
15 years 4 months ago
Ant colony optimization technique for equilibrium assignment in congested transportation networks
This paper deals with transport user equilibrium. A modified version of the ant colony system is proposed where the ant colony heuristic is adapted in order to take into account a...
Matteo Matteucci, Lorenzo Mussone
93
Voted
IDA
2008
Springer
15 years 22 days ago
A comprehensive analysis of hyper-heuristics
Meta-heuristics such as simulated annealing, genetic algorithms and tabu search have been successfully applied to many difficult optimization problems for which no satisfactory pro...
Ender Özcan, Burak Bilgin, Emin Erkan Korkmaz
JMLR
2006
90views more  JMLR 2006»
15 years 19 days ago
Superior Guarantees for Sequential Prediction and Lossless Compression via Alphabet Decomposition
We present worst case bounds for the learning rate of a known prediction method that is based on hierarchical applications of binary context tree weighting (CTW) predictors. A heu...
Ron Begleiter, Ran El-Yaniv
JUCS
2010
148views more  JUCS 2010»
14 years 11 months ago
Applying RFD to Construct Optimal Quality-Investment Trees
: River Formation Dynamics (RFD) is an evolutionary computation method based on copying how drops form rivers by eroding the ground and depositing sediments. Given a cost-evaluated...
Pablo Rabanal, Ismael Rodríguez, Fernando R...