Sciweavers

2006 search results - page 235 / 402
» Heuristic Security-Testing Methods
Sort
View
137
Voted
NAACL
1994
15 years 6 months ago
Toward Multi-Engine Machine Translation
Current MT systems, whatever translation method they at present employ, do not reach an optimum output on free text. Our hypothesis for the experiment reported in this paper is th...
Sergei Nirenburg, Robert E. Frederking
MVA
1992
131views Computer Vision» more  MVA 1992»
15 years 6 months ago
A New Perceptual Approach to Noisy X-Ray Image Segmentation
Thls paper proposes a new perceptual approach to noisy X-ray image segmentation. It consistsof the five major step :(1)Pre -segmentation, (2)Improved region growing, (3 ) Object de...
Jian-qin Liu, Nanning Zheng, Xudong Guan
AIPS
2009
15 years 6 months ago
Ant Search Strategies For Planning Optimization
In this paper a planning framework based on Ant Colony Optimization techniques is presented. It is well known that finding optimal solutions to planning problems is a very hard co...
Marco Baioletti, Alfredo Milani, Valentina Poggion...
GECCO
2008
Springer
109views Optimization» more  GECCO 2008»
15 years 6 months ago
Focused no free lunch theorems
Proofs and empirical evidence are presented which show that a subset of algorithms can have identical performance over a subset of functions, even when the subset of functions is ...
Darrell Whitley, Jonathan E. Rowe
GECCO
2008
Springer
148views Optimization» more  GECCO 2008»
15 years 6 months ago
Solving constrained multi-objective problems by objective space analysis
In this paper a new approach to solve constrained multi-objective problems by way of evolutionary multi-objective optimization is introduced. In contrast to former evolutionary ap...
Gideon Avigad, Carlos A. Coello Coello