Sciweavers

2006 search results - page 230 / 402
» Heuristic Security-Testing Methods
Sort
View
CIKM
2008
Springer
15 years 7 months ago
Coreex: content extraction from online news articles
We developed and tested a heuristic technique for extracting the main article from news site Web pages. We construct the DOM tree of the page and score every node based on the amo...
Jyotika Prasad, Andreas Paepcke
CIS
2008
Springer
15 years 7 months ago
A Near-Optimal Redundancy Allocation Strategy that Minimizes a System's Vulnerability to Hazardous Events and Malicious Attacks
Delivering continuous services in information infrastructures is a major challenge. For system or network administrators, redundancy allocation is one of the best strategies to en...
Frank Yeong-Sung Lin, Po-Hao Tsang, Kun-Dao Jiang
CP
2008
Springer
15 years 6 months ago
Probabilistically Estimating Backbones and Variable Bias: Experimental Overview
Backbone variables have the same assignment in all solutions to a given constraint satisfaction problem; more generally, bias represents the proportion of solutions that assign a v...
Eric I. Hsu, Christian J. Muise, J. Christopher Be...
EVOW
2008
Springer
15 years 6 months ago
Improving Metaheuristic Performance by Evolving a Variable Fitness Function
In this paper we study a complex real world workforce scheduling problem. We apply constructive search and variable neighbourhood search (VNS) metaheuristics and enhance these meth...
Keshav P. Dahal, Stephen Remde, Peter I. Cowling, ...
ACL
2008
15 years 6 months ago
In-Browser Summarisation: Generating Elaborative Summaries Biased Towards the Reading Context
We investigate elaborative summarisation, where the aim is to identify supplementary information that expands upon a key fact. We envisage such summaries being useful when browsin...
Stephen Wan, Cécile Paris