Sciweavers

2006 search results - page 31 / 402
» Heuristic Security-Testing Methods
Sort
View
93
Voted
IPPS
2005
IEEE
15 years 6 months ago
MaTCH : Mapping Data-Parallel Tasks on a Heterogeneous Computing Platform Using the Cross-Entropy Heuristic
We propose in this paper a heuristic for mapping a set of interacting tasks of a parallel application onto a heterogeneous computing platform such as a computational grid. Our nov...
Soumya Sanyal, Sajal K. Das
101
Voted
BMCBI
2005
158views more  BMCBI 2005»
15 years 11 days ago
Automated generation of heuristics for biological sequence comparison
Background: Exhaustive methods of sequence alignment are accurate but slow, whereas heuristic approaches run quickly, but their complexity makes them more difficult to implement. ...
Guy St. C. Slater, Ewan Birney
82
Voted
AUSAI
2005
Springer
15 years 6 months ago
A Multi-exchange Heuristic for a Production Location Problem
In this work, we develop a multi-exchange heuristic based on an estimation improvement graph embedded in a simulated annealing to solve a problem arising in plant location planning...
Yunsong Guo, Yanzhi Li, Andrew Lim, Brian Rodrigue...
DAGM
2007
Springer
15 years 6 months ago
Comparison of Adaptive Spatial Filters with Heuristic and Optimized Region of Interest for EEG Based Brain-Computer-Interfaces
Research on EEG based brain-computer-interfaces (BCIs) aims at steering devices by thought. Even for simple applications, BCIs require an extremely effective data processing to wo...
Christian Liefhold, Moritz Grosse-Wentrup, Klaus G...
114
Voted
ACCV
2006
Springer
15 years 6 months ago
Heuristic Pre-clustering Relevance Feedback in Region-Based Image Retrieval
Relevance feedback (RF) and region-based image retrieval (RBIR) are two widely used methods to enhance the performance of contentbased image retrieval (CBIR) systems. In this paper...
Wan-Ting Su, Wen-Sheng Chu, James Jenn-Jier Lien