Sciweavers

2006 search results - page 115 / 402
» Heuristic Security-Testing Methods
Sort
View
49
Voted
GECCO
2005
Springer
15 years 6 months ago
On the practical genetic algorithms
This paper offers practical design-guidelines for developing efficient genetic algorithms (GAs) to successfully solve realworld problems. As an important design component, a prac...
Chang Wook Ahn, Sanghoun Oh, Rudrapatna S. Ramakri...
FPGA
1995
ACM
107views FPGA» more  FPGA 1995»
15 years 4 months ago
Multi-way System Partitioning into a Single Type or Multiple Types of FPGAs
This paper considers the problem of partitioning a circuit into a collection of subcircuits, such that each subcircuit is feasible for some device from an FPGA library, and the to...
Dennis J.-H. Huang, Andrew B. Kahng
EMNLP
2008
15 years 2 months ago
Phrase Translation Probabilities with ITG Priors and Smoothing as Learning Objective
The conditional phrase translation probabilities constitute the principal components of phrase-based machine translation systems. These probabilities are estimated using a heurist...
Markos Mylonakis, Khalil Sima'an
96
Voted
TREC
2004
15 years 2 months ago
The University of Michigan in Novelty 2004
This year we participated in the Novelty track. To find the relevant sentences, we combine sentence salience features that are inherited from text summarization domain with other ...
Günes Erkan
101
Voted
AAAI
1990
15 years 1 months ago
Inductive Synthesis of Equational Programs
An equational approach to the synthesis of functional and logic programs is taken. Typically, a target program contains equations that are only true in the standard model of the g...
Nachum Dershowitz, Eli Pinchover