Sciweavers

2006 search results - page 134 / 402
» Heuristic Security-Testing Methods
Sort
View
CEC
2009
IEEE
15 years 7 months ago
Evolutionary image segmentation based on multiobjective clustering
— In the fields of image processing and recognition, image segmentation is an important basic technique in which an image is partitioned into multiple regions (sets of pixels). ...
Shinichi Shirakawa, Tomoharu Nagao
92
Voted
WEBI
2009
Springer
15 years 5 months ago
Summarizing Documents by Measuring the Importance of a Subset of Vertices within a Graph
— This paper presents a novel method of generating extractive summaries for multiple documents. Given a cluster of documents, we firstly construct a graph where each vertex repre...
Shouyuan Chen, Minlie Huang, Zhiyong Lu
130
Voted
ECAI
2010
Springer
15 years 1 months ago
Symmetries of Symmetry Breaking Constraints
Symmetry is an important feature of many constraint programs. We show that any symmetry acting on a set of symmetry breaking constraints can be used to break symmetry. Different s...
George Katsirelos, Toby Walsh
MP
2006
73views more  MP 2006»
15 years 21 days ago
On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming
We present a primal-dual interior-point algorithm with a filter line-search method for nonlinear programming. Local and global convergence properties of this method were analyzed i...
Andreas Wächter, Lorenz T. Biegler
FOCM
2011
175views more  FOCM 2011»
14 years 7 months ago
Convergence of Fixed-Point Continuation Algorithms for Matrix Rank Minimization
The matrix rank minimization problem has applications in many fields such as system identification, optimal control, low-dimensional embedding etc. As this problem is NP-hard in ...
Donald Goldfarb, Shiqian Ma