Sciweavers

2006 search results - page 111 / 402
» Heuristic Security-Testing Methods
Sort
View
128
Voted
CORR
2007
Springer
99views Education» more  CORR 2007»
15 years 20 days ago
Evolutionary Mesh Numbering: Preliminary Results
Abstract. Mesh numbering is a critical issue in Finite Element Methods, as the computational cost of one analysis is highly dependent on the order of the nodes of the mesh. This pa...
Francis Sourd, Marc Schoenauer
COLING
2010
14 years 7 months ago
Discriminative Induction of Sub-Tree Alignment using Limited Labeled Data
We employ Maximum Entropy model to conduct sub-tree alignment between bilingual phrasal structure trees. Various lexical and structural knowledge is explored to measure the syntac...
Jun Sun, Min Zhang, Chew Lim Tan
107
Voted
TSC
2010
159views more  TSC 2010»
14 years 7 months ago
A Mathematical Programming Approach for Server Consolidation Problems in Virtualized Data Centers
Today's data centers offer IT services mostly hosted on dedicated physical servers. Server virtualization provides a technical means for server consolidation. Thus, multiple v...
Benjamin Speitkamp, Martin Bichler
126
Voted
LPAR
2012
Springer
13 years 8 months ago
E-Matching with Free Variables
E-matching is the most commonly used technique to handle quantifiers in SMT solvers. It works by identifying characteristic subexpressions of quantified formulae, named triggers,...
Philipp Rümmer
PAMI
2012
13 years 3 months ago
Learning Optimal Embedded Cascades
—The problem of automatic and optimal design of embedded object detector cascades is considered. Two main challenges are identified: optimization of the cascade configuration and...
Mohammad Javad Saberian, Nuno Vasconcelos