Sciweavers

2006 search results - page 167 / 402
» Heuristic Security-Testing Methods
Sort
View
96
Voted
GECCO
2003
Springer
201views Optimization» more  GECCO 2003»
15 years 6 months ago
Solving Mastermind Using Genetic Algorithms
The MasterMind game involves decoding a secret code. The classic game is a code of six possible colors in four slots. The game has been analyzed and optimal strategies have been po...
Tom Kalisker, Doug Camens
115
Voted
ICPR
2008
IEEE
16 years 2 months ago
Learning weighted distances for relevance feedback in image retrieval
We present a new method for relevance feedback in image retrieval and a scheme to learn weighted distances which can be used in combination with different relevance feedback metho...
Enrique Vidal, Hermann Ney, Roberto Paredes, Thoma...
ICCAD
2007
IEEE
134views Hardware» more  ICCAD 2007»
15 years 10 months ago
Hybrid CEGAR: combining variable hiding and predicate abstraction
ion Chao Wang NEC Laboratories America Hyondeuk Kim University of Colorado Aarti Gupta NEC Laboratories America Variable hiding and predicate abstraction are two popular abstracti...
Chao Wang, Hyondeuk Kim, Aarti Gupta
107
Voted
ICRA
2009
IEEE
137views Robotics» more  ICRA 2009»
15 years 7 months ago
Integration of impedance control and manipulability regulation for a finger-arm robot
— Motion control algorithms were proposed for a 9-DOF finger-arm robot by using the finger manipulability obtained in a previous study. However, in the previous study, only metho...
Jian Huang, Daisuke Yamada, Takayuki Hori, Masayuk...
ECIR
2007
Springer
15 years 2 months ago
Combination of Document Priors in Web Information Retrieval
Query-independent features (also called document priors), such as the number of incoming links to a document, its Page-Rank, or the type of its associated URL, have been successfu...
Jie Peng, Iadh Ounis