Sciweavers

2006 search results - page 125 / 402
» Heuristic Security-Testing Methods
Sort
View
108
Voted
CCECE
2006
IEEE
15 years 6 months ago
Dynamic and Parallel Approaches to Optimal Evolutionary Tree Construction
Phylogenetic trees are commonly reconstructed based on hard optimization problems such as Maximum parsimony (MP) and Maximum likelihood (ML). Conventional MP heuristics for produc...
Anupam Bhattacharjee, Kazi Zakia Sultana, Zalia Sh...
121
Voted
ICRA
2005
IEEE
111views Robotics» more  ICRA 2005»
15 years 6 months ago
Single-Query Entropy-Guided Path Planning
Motion planning for robots with many degrees of freedom requires the exploration of an exponentially large configuration space. Single-query motion planners restrict exploration ...
Brendan Burns, Oliver Brock
104
Voted
ITS
2004
Springer
124views Multimedia» more  ITS 2004»
15 years 6 months ago
Combining Competing Language Understanding Approaches in an Intelligent Tutoring System
When implementing a tutoring system that attempts a deep understanding of students’ natural language explanations, there are three basic approaches to choose between; symbolic, i...
Pamela W. Jordan, Maxim Makatchev, Kurt VanLehn
WABI
2004
Springer
109views Bioinformatics» more  WABI 2004»
15 years 6 months ago
Online Consensus and Agreement of Phylogenetic Trees
Computational heuristics are the primary methods for reconstruction of phylogenetic trees on large datasets. Most large-scale phylogenetic analyses produce numerous trees that are ...
Tanya Y. Berger-Wolf
DSN
2003
IEEE
15 years 6 months ago
An Algorithm for Automatically Obtaining Distributed and Fault-Tolerant Static Schedules
Our goal is to automatically obtain a distributed and fault-tolerant embedded system: distributed because the system must run on a distributed architecture; fault-tolerant because...
Alain Girault, Hamoudi Kalla, Mihaela Sighireanu, ...