Sciweavers

2006 search results - page 129 / 402
» Heuristic Security-Testing Methods
Sort
View
TCBB
2008
122views more  TCBB 2008»
15 years 20 days ago
Mixed Integer Linear Programming for Maximum-Parsimony Phylogeny Inference
Reconstruction of phylogenetic trees is a fundamental problem in computational biology. While excellent heuristic methods are available for many variants of this problem, new adva...
Srinath Sridhar, Fumei Lam, Guy E. Blelloch, R. Ra...
91
Voted
DAC
1998
ACM
16 years 1 months ago
Multi-Pad Power/Ground Network Design for Uniform Distribution of Ground Bounce
This paper presents a method for power and ground (p/g) network routing for high speed CMOS chips with multiple p/g pads. Our objective is not to reduce the total amount of the gr...
Jaewon Oh, Massoud Pedram
CRV
2008
IEEE
116views Robotics» more  CRV 2008»
15 years 7 months ago
Segmentation of Rectangular Objects Lying on an Unknown Background in a Small Preview Scan Image
We describe a method to segment rectangular objects that lie on a slightly textured background of an a-priori unknown colour. Our contribution consists of a fast and accurate back...
Michael Guerzhoy, Hui Zhou
SAINT
2008
IEEE
15 years 7 months ago
Variable Neighborhood Search for a Prize Collecting Capacity Constrained Connected Facility Location Problem
We present a Variable Neighborhood Search approach for a network design problem occurring in real world when the bandwidth of an existing network shall be enhanced. Using two diff...
Markus Leitner, Günther R. Raidl
GD
2007
Springer
15 years 7 months ago
Drawing Graphs with GLEE
This paper describes novel methods we developed to lay out graphs using Sugiyama’s scheme [16] in a tool named GLEE. The main contributions are: a heuristic for creating a graph ...
Lev Nachmanson, George G. Robertson, Bongshin Lee