Sciweavers

2006 search results - page 150 / 402
» Heuristic Security-Testing Methods
Sort
View
ACL
2004
15 years 3 months ago
Finding Predominant Word Senses in Untagged Text
In word sense disambiguation (WSD), the heuristic of choosing the most common sense is extremely powerful because the distribution of the senses of a word is often skewed. The pro...
Diana McCarthy, Rob Koeling, Julie Weeds, John A. ...
AIPS
2004
15 years 3 months ago
Decision-Theoretic Military Operations Planning
Military operations planning involves concurrent actions, resource assignment, and conflicting costs. Individual tasks sometimes fail with a known probability, promoting a decisio...
Douglas Aberdeen, Sylvie Thiébaux, Lin Zhan...
135
Voted
GECCO
2008
Springer
137views Optimization» more  GECCO 2008»
15 years 3 months ago
Rank based variation operators for genetic algorithms
We show how and why using genetic operators that are applied with probabilities that depend on the fitness rank of a genotype or phenotype offers a robust alternative to the Sim...
Jorge Cervantes, Christopher R. Stephens
90
Voted
COR
2010
164views more  COR 2010»
15 years 2 months ago
The distributed permutation flowshop scheduling problem
This paper studies a new generalization of the regular permutation flowshop scheduling problem (PFSP) referred to as the distributed permutation flowshop scheduling problem or DPF...
B. Naderi, Rubén Ruiz
102
Voted
PRL
2006
85views more  PRL 2006»
15 years 2 months ago
Image segmentation based on merging of sub-optimal segmentations
In this paper a heuristic segmentation algorithm is presented based on the oversegmentation of an image. The method uses a set of different segmentations of the image produced pre...
Juan Carlos Pichel, David E. Singh, Francisco F. R...