Sciweavers

2006 search results - page 149 / 402
» Heuristic Security-Testing Methods
Sort
View
111
Voted
ISLPED
1999
ACM
91views Hardware» more  ISLPED 1999»
15 years 5 months ago
Stochastic modeling of a power-managed system: construction and optimization
-- The goal of a dynamic power management policy is to reduce the power consumption of an electronic system by putting system components into different states, each representing ce...
Qinru Qiu, Qing Wu, Massoud Pedram
96
Voted
VLDB
1999
ACM
148views Database» more  VLDB 1999»
15 years 5 months ago
Loading a Cache with Query Results
Data intensive applications today usually run in either a clientserver or a middleware environment. In either case, they must efficiently handle both database queries, which proc...
Laura M. Haas, Donald Kossmann, Ioana Ursu
FMCAD
2007
Springer
15 years 4 months ago
Boosting Verification by Automatic Tuning of Decision Procedures
Parameterized heuristics abound in computer aided design and verification, and manual tuning of the respective parameters is difficult and time-consuming. Very recent results from ...
Frank Hutter, Domagoj Babic, Holger H. Hoos, Alan ...
155
Voted
CVPR
2009
IEEE
15 years 4 months ago
Robust unsupervised segmentation of degraded document images with topic models
Segmentation of document images remains a challenging vision problem. Although document images have a structured layout, capturing enough of it for segmentation can be difficult....
Timothy J. Burns, Jason J. Corso
129
Voted
ATAL
2008
Springer
15 years 2 months ago
Searching for approximate equilibria in empirical games
When exploring a game over a large strategy space, it may not be feasible or cost-effective to evaluate the payoff of every relevant strategy profile. For example, determining a p...
Patrick R. Jordan, Yevgeniy Vorobeychik, Michael P...