Sciweavers

2006 search results - page 109 / 402
» Heuristic Security-Testing Methods
Sort
View
181
Voted
IHI
2012
293views Healthcare» more  IHI 2012»
13 years 8 months ago
iCircos: visual analytics for translational bioinformatics
Translational bioinformatics increasingly involves the discovery of associations between molecular and phenotype information, with the goal of transforming those discoveries into ...
Suresh K. Bhavnani, Mamta Abbas, Vickie McMicken, ...
AI
2000
Springer
15 years 16 days ago
A Lagrangian reconstruction of GENET
GENET is a heuristic repair algorithm which demonstrates impressive e ciency in solving some large-scale and hard instances of constraint satisfaction problems (CSPs). In this pap...
Kenneth M. F. Choi, Jimmy Ho-Man Lee, Peter J. Stu...
TASE
2010
IEEE
14 years 7 months ago
Optimization of Group Elevator Scheduling With Advance Information
Group elevator scheduling has received considerable attention due to its importance to transportation efficiency for mid-rise and high-rise buildings. One important trend to improv...
Jin Sun, Qianchuan Zhao, Peter B. Luh
CADE
2002
Springer
16 years 1 months ago
Reasoning by Symmetry and Function Ordering in Finite Model Generation
Abstract. Finite model search for first-order logic theories is complementary to theorem proving. Systems like Falcon, SEM and FMSET use the known LNH (Least Number Heuristic) heur...
Gilles Audemard, Belaid Benhamou
ISPD
1997
ACM
186views Hardware» more  ISPD 1997»
15 years 4 months ago
EWA: exact wiring-sizing algorithm
The wire sizing problem under inequality Elmore delay constraints is known to be posynomial, hence convex under an exponential variable-transformation. There are formal methods fo...
Rony Kay, Gennady Bucheuv, Lawrence T. Pileggi