Sciweavers

2006 search results - page 131 / 402
» Heuristic Security-Testing Methods
Sort
View
92
Voted
GECCO
2003
Springer
124views Optimization» more  GECCO 2003»
15 years 6 months ago
Integrated Genetic Algorithm with Hill Climbing for Bandwidth Minimization Problem
In this paper, we propose an integrated Genetic Algorithm with Hill Climbing to solve the matrix bandwidth minimization problem, which is to reduce bandwidth by permuting rows and ...
Andrew Lim, Brian Rodrigues, Fei Xiao
ICCSA
2003
Springer
15 years 6 months ago
Uniform Approximations for Transcendental Functions
A heuristic method to construct uniform approximations to analytic transcendental functions is developed as a generalization of the Hermite-Pad´e interpolation to infinite interv...
Serge Winitzki
122
Voted
SP
1996
IEEE
101views Security Privacy» more  SP 1996»
15 years 4 months ago
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
We present new results on a distributable changedetection method inspired by the natural immune system. A weakness in the original algorithm was the exponential cost of generating...
Patrik D'haeseleer, Stephanie Forrest, Paul Helman
88
Voted
ICTAI
1994
IEEE
15 years 4 months ago
Iterative Strengthening: An Algorithm for Generating Anytime Optimal Plans
In order to perform adequately in real-world situations, a planning system must be able to nd the \best" solution while still supporting anytime behavior. We have developed ...
Randall J. Calistri-Yeh
78
Voted
DSD
2009
IEEE
71views Hardware» more  DSD 2009»
15 years 4 months ago
Representation of Incompletely Specified Index Generation Functions Using Minimal Number of Compound Variables
This paper shows a method to reduce the number of input variables to represent incompletely specified index generation functions. A compound variable is generated by EXORing the o...
Tsutomu Sasao, Takaaki Nakamura, Munehiro Matsuura