Sciweavers

2006 search results - page 148 / 402
» Heuristic Security-Testing Methods
Sort
View
98
Voted
CC
2007
Springer
126views System Software» more  CC 2007»
15 years 7 months ago
An Array Allocation Scheme for Energy Reduction in Partitioned Memory Architectures
This paper presents a compiler technique that reduces the energy consumption of the memory subsystem, for an off-chip partitioned memory architecture having multiple memory banks ...
K. Shyam, R. Govindarajan
104
Voted
SAINT
2005
IEEE
15 years 6 months ago
Inductive Logic Programming for Structure-Activity Relationship Studies on Large Scale Data
Inductive Logic Programming (ILP) is a combination of inductive learning and first-order logic aiming to learn first-order hypotheses from training examples. ILP has a serious b...
Cholwich Nattee, Sukree Sinthupinyo, Masayuki Numa...
96
Voted
GECCO
2005
Springer
140views Optimization» more  GECCO 2005»
15 years 6 months ago
Isolating the benefits of respect
The three mechanisms of crossover are transmission, assortment, and respect. Of these three mechanisms, assortment (i.e. recombination) is traditionally viewed as the primary feat...
Stephen Chen, Gregory Pitt
89
Voted
ATAL
2003
Springer
15 years 6 months ago
A multiagent-system for integrating a large-scale project
This paper presents a multiagent-system for integrating ALICE: a real-life, distributed, large-scale particle physics experiment of the LHC project at CERN. The work is concerned ...
Carlos Eisenberg, Boi Faltings, Lars Leistam
ICCBR
2001
Springer
15 years 5 months ago
A Fuzzy-Rough Approach for Case Base Maintenance
Abstract. This paper proposes a fuzzy-rough method of maintaining CaseBased Reasoning (CBR) systems. The methodology is mainly based on the idea that a large case library can be tr...
Guoqing Cao, Simon C. K. Shiu, Xizhao Wang