Sciweavers

2006 search results - page 153 / 402
» Heuristic Security-Testing Methods
Sort
View
109
Voted
CAV
2007
Springer
120views Hardware» more  CAV 2007»
15 years 7 months ago
Using Counterexamples for Improving the Precision of Reachability Computation with Polyhedra
Abstract. We present an extrapolation with care set operator to accelerate termination of reachability computation with polyhedra. At the same time, a counterexample guided refine...
Chao Wang, Zijiang Yang, Aarti Gupta, Franjo Ivanc...
70
Voted
SEMWEB
2007
Springer
15 years 7 months ago
Uncertain Reasoning for Creating Ontology Mapping on the Semantic Web
Mapping ontologies with high precision on the Semantic Web is a challenging problem that needs to be addressed in various domains. One of the main problems with any mapping process...
Miklos Nagy, Maria Vargas-Vera, Enrico Motta
ISCAS
2005
IEEE
138views Hardware» more  ISCAS 2005»
15 years 6 months ago
Modeling of MOS transistors based on genetic algorithm and simulated annealing
— A novel method to extract the efficient model for Metal-Oxide-Semiconductor (MOS) transistors in order to satisfy a specific accuracy is presented. The approach presented here ...
Mohammad Taherzadeh-Sani, Ali Abbasian, Behnam Ame...
101
Voted
MSWIM
2005
ACM
15 years 6 months ago
The optimal choice of encoding parameters for MPEG-4 AAC streamed over wireless networks
This paper addresses a novel linear programming based approach to optimize the choice of the encoding parameters for the MPEG-4 AAC audio codec. Current techniques solve the encod...
Claus Bauer
90
Voted
GECCO
2004
Springer
117views Optimization» more  GECCO 2004»
15 years 6 months ago
Comparing Search Algorithms for the Temperature Inversion Problem
Several inverse problems exist in the atmospheric sciences that are computationally costly when using traditional gradient based methods. Unfortunately, many standard evolutionary ...
Monte Lunacek, L. Darrell Whitley, Philip Gabriel,...