Sciweavers

2006 search results - page 49 / 402
» Heuristic Security-Testing Methods
Sort
View
COMSWARE
2006
IEEE
15 years 5 months ago
Spread-based heuristic for sensor selection in sensor networks
In this paper we propose a method for selecting an appropriate subset of sensors with a view to minimize estimation error while tracking a target with sensors spread across in a 2...
Vaishali P. Sadaphal, Bijendra N. Jain
HICSS
2005
IEEE
157views Biometrics» more  HICSS 2005»
15 years 4 months ago
A Two-Stage Heuristic for the Vehicle Routing Problem with Time Windows and a Limited Number of Vehicles
The Vehicle Routing Problem with Time Windows (VRPTW) is an important problem in logistics. The problem is to serve a number of customers at minimum cost without violating the cus...
Andrew Lim, Xingwen Zhang
ICANNGA
2009
Springer
163views Algorithms» more  ICANNGA 2009»
15 years 2 months ago
Elitistic Evolution: An Efficient Heuristic for Global Optimization
A new evolutionary algorithm, Elitistic Evolution (termed EEv), is proposed in this paper. EEv is an evolutionary method for numerical optimization with adaptive behavior. EEv uses...
Francisco Viveros Jiménez, Efrén Mez...
IJCAI
2001
15 years 12 days ago
The Exponentiated Subgradient Algorithm for Heuristic Boolean Programming
Boolean linear programs (BLPs) are ubiquitous in AI. Satisfiability testing, planning with resource constraints, and winner determination in combinatorial auctions are all example...
Dale Schuurmans, Finnegan Southey, Robert C. Holte
ICRA
2010
IEEE
142views Robotics» more  ICRA 2010»
14 years 9 months ago
A quadratic regulator-based heuristic for rapidly exploring state space
Abstract— Kinodynamic planning algorithms like RapidlyExploring Randomized Trees (RRTs) hold the promise of finding feasible trajectories for rich dynamical systems with complex...
Elena Leah Glassman, Russ Tedrake