Sciweavers

2006 search results - page 50 / 402
» Heuristic Security-Testing Methods
Sort
View
JUCS
2010
106views more  JUCS 2010»
14 years 9 months ago
A Heuristic Approach to Positive Root Isolation for Multiple Power Sums
: Given a multiple power sum (extending polynomial’s exponents to real numbers), the positive root isolation problem is to find a list of disjoint intervals, satisfying that the...
Ming Xu, Chuandong Mu, Zhenbing Zeng, Zhi-bin Li
81
Voted
GECCO
2005
Springer
140views Optimization» more  GECCO 2005»
15 years 4 months ago
CGP visits the Santa Fe trail: effects of heuristics on GP
GP uses trees to represent chromosomes. The user defines the representation space by defining the set of functions and terminals to label the nodes in the trees, and GP searches t...
Cezary Z. Janikow, Christopher J. Mann
GROUP
2009
ACM
15 years 5 months ago
Usability heuristics for networked multiplayer games
Networked multiplayer games must support a much wider variety of interactions than single-player games because networked games involve communication and coordination between playe...
David Pinelle, Nelson Wong, Tadeusz Stach, Carl Gu...
AAAI
2010
15 years 14 days ago
Searching Without a Heuristic: Efficient Use of Abstraction
g Without a Heuristic: Efficient Use of Abstraction Bradford Larsen, Ethan Burns, Wheeler Ruml Department of Computer Science University of New Hampshire Durham, NH 03824 USA blars...
Bradford John Larsen, Ethan Burns, Wheeler Ruml, R...
CHI
2005
ACM
15 years 11 months ago
Evaluating an ambient display for the home
We present our experiences with evaluating an ambient display for the home using two different evaluation techniques: the recently proposed `Heuristic Evaluation of Ambient Displa...
Sunny Consolvo, Jeffrey Towle