Sciweavers

2006 search results - page 132 / 402
» Heuristic Security-Testing Methods
Sort
View
66
Voted
CEAS
2006
Springer
15 years 4 months ago
Email Thread Reassembly Using Similarity Matching
Email thread reassembly is the task of linking messages by parentchild relationships. In this paper, we present two approaches to address this problem. One exploits previously und...
Jen-Yuan Yeh
DAGM
2006
Springer
15 years 4 months ago
Provably Correct Edgel Linking and Subpixel Boundary Reconstruction
Existing methods for segmentation by edgel linking are based on heuristics and give no guarantee for a topologically correct result. In this paper, we propose an edgel linking algo...
Ullrich Köthe, Peer Stelldinger, Hans Meine
GECCO
2006
Springer
162views Optimization» more  GECCO 2006»
15 years 4 months ago
Indirect co-evolution for understanding belief in an incomplete information dynamic game
This study aims to design a new co-evolution algorithm, Mixture Co-evolution which enables modeling of integration and composition of direct co-evolution and indirect coevolution....
Nanlin Jin
81
Voted
NAACL
2007
15 years 2 months ago
An Information Retrieval Approach to Sense Ranking
In word sense disambiguation, choosing the most frequent sense for an ambiguous word is a powerful heuristic. However, its usefulness is restricted by the availability of sense-an...
Mirella Lapata, Frank Keller
WSCG
2004
141views more  WSCG 2004»
15 years 2 months ago
Efficient Generation of Triangle Strips from Triangulated Meshes
This paper presents a fast algorithm for generating triangle strips from triangulated meshes, providing a compact representation suitable for transmission and rendering of the mod...
Oliver Matias van Kaick, Murilo Vicente Gonç...