Sciweavers

2006 search results - page 173 / 402
» Heuristic Security-Testing Methods
Sort
View
ICPR
2010
IEEE
15 years 6 months ago
Social Network Approach to Analysis of Soccer Game
Video understanding has been an active area of research, where many articles have been published on how to detect and track objects in videos, and how to analyze their trajectorie...
Kyoung-Jin Park, Alper Yilmaz
ICSM
2005
IEEE
15 years 6 months ago
Measurement and Quality in Object-Oriented Design
In order to support the maintenance of object-oriented software systems, the quality of their design must be evaluated using adequate quantification means. In spite of the curren...
Radu Marinescu
GECCO
2005
Springer
127views Optimization» more  GECCO 2005»
15 years 6 months ago
The enhanced evolutionary tabu search and its application to the quadratic assignment problem
We describe the Enhanced Evolutionary Tabu Search (EE-TS) local search technique. The EE-TS metaheuristic technique combines Reactive Tabu Search with evolutionary computing eleme...
John F. McLoughlin III, Walter Cedeño
DILS
2004
Springer
15 years 6 months ago
Heterogeneous Data Integration with the Consensus Clustering Formalism
Meaningfully integrating massive multi-experimental genomic data sets is becoming critical for the understanding of gene function. We have recently proposed methodologies for integ...
Vladimir Filkov, Steven Skiena
ICSNW
2004
Springer
84views Database» more  ICSNW 2004»
15 years 6 months ago
Emergent Semantics Systems
With new standards like RDF or OWL paving the way for the much anticipated Semantic Web, a new breed of very large scale semantic systems is about to appear. Traditional semantic r...
Karl Aberer, Tiziana Catarci, Philippe Cudré...