Sciweavers

2006 search results - page 162 / 402
» Heuristic Security-Testing Methods
Sort
View
VMCAI
2004
Springer
15 years 6 months ago
Liveness with Invisible Ranking
The method of Invisible Invariants was developed originally in order to verify safety properties of parameterized systems fully automatically. Roughly speaking, the method is based...
Yi Fang, Nir Piterman, Amir Pnueli, Lenore D. Zuck
WAIM
2004
Springer
15 years 6 months ago
An Empirical Study of Building Compact Ensembles
Abstract. Ensemble methods can achieve excellent performance relying on member classifiers’ accuracy and diversity. We conduct an empirical study of the relationship of ensemble...
Huan Liu, Amit Mandvikar, Jigar Mody
CEC
2003
IEEE
15 years 6 months ago
Adaptive temperature schedule determined by genetic algorithm for parallel simulated annealing
Abstract- Simulated annealing (SA) is an effective general heuristic method for solving many combinatorial optimization problems. This paper deals with two problems in SA. One is ...
Mitsunori Miki, Tomoyuki Hiroyasu, Jun'ya Wako, Ta...
ICDM
2003
IEEE
104views Data Mining» more  ICDM 2003»
15 years 6 months ago
Structure Search and Stability Enhancement of Bayesian Networks
Learning Bayesian network structure from large-scale data sets, without any expertspecified ordering of variables, remains a difficult problem. We propose systematic improvements ...
Hanchuan Peng, Chris H. Q. Ding
INFOCOM
2002
IEEE
15 years 6 months ago
On double-link failure recovery in WDM optical networks
— Network survivability is a crucial requirement in high-speed optical networks. Typical approaches of providing survivability have considered the failure of a single component s...
Hongsik Choi, Suresh Subramaniam, Hyeong-Ah Choi