Sciweavers

2006 search results - page 118 / 402
» Heuristic Security-Testing Methods
Sort
View
89
Voted
GECCO
2005
Springer
101views Optimization» more  GECCO 2005»
15 years 6 months ago
Measuring mobility and the performance of global search algorithms
The global search properties of heuristic search algorithms are not well understood. In this paper, we introduce a new metric, mobility, that quantifies the dispersion of local o...
Monte Lunacek, L. Darrell Whitley, James N. Knight
88
Voted
ICIC
2005
Springer
15 years 6 months ago
Improvements to the Conventional Layer-by-Layer BP Algorithm
This paper points out some drawbacks and proposes some modifications to the conventional layer-by-layer BP algorithm. In particular, we present a new perspective to the learning ra...
Xu-Qin Li, Fei Han, Tat-Ming Lok, Michael R. Lyu, ...
90
Voted
IEAAIE
2005
Springer
15 years 6 months ago
The Coordination of Parallel Search with Common Components
The preservation of common components has been recently isolated as a beneficial feature of genetic algorithms. One interpretation of this benefit is that the preservation of commo...
Stephen Chen, Gregory Pitt
109
Voted
EUROMICRO
2000
IEEE
15 years 5 months ago
Task Assignment and Scheduling under Memory Constraints
Many DSP and image processing embedded systems have hard memory constraints which makes it difficult to find a good task assignment and scheduling which fulfill these constrain...
Radoslaw Szymanek, Krzysztof Kuchcinski
89
Voted
DATE
2010
IEEE
149views Hardware» more  DATE 2010»
15 years 5 months ago
Efficient decision ordering techniques for SAT-based test generation
Model checking techniques are promising for automated generation of directed tests. However, due to the prohibitively large time and resource requirements, conventional model chec...
Mingsong Chen, Xiaoke Qin, Prabhat Mishra