Sciweavers

2006 search results - page 53 / 402
» Heuristic Security-Testing Methods
Sort
View
ANOR
2005
93views more  ANOR 2005»
14 years 11 months ago
Looking Ahead with the Pilot Method
The pilot method as a meta-heuristic is a tempered greedy method aimed at obtaining better solutions while avoiding the greedy trap by looking ahead for each possible choice. Repea...
Stefan Voß, Andreas Fink, Cees Duin
ER
2004
Springer
106views Database» more  ER 2004»
15 years 4 months ago
Use of Tabular Analysis Method to Construct UML Sequence Diagrams
A sequence diagram in UML is used to model interactions among objects that participate in a use case. Developing a sequence diagram is complex; our experience shows that novice dev...
Margaret Hilsbos, Il-Yeol Song
AI
1998
Springer
15 years 3 months ago
A Hybrid Convergent Method for Learning Probabilistic Networks
During past few years, a variety of methods have been developed for learning probabilistic networks from data, among which the heuristic single link forward or backward searches ar...
Jun Liu, Kuo-Chu Chang, Jing Zhou
COR
2004
139views more  COR 2004»
14 years 11 months ago
A tabu search heuristic for the vehicle routing problem with time windows and split deliveries
The routing of a fleet of vehicles to service a set of customers is important in the field of distribution. Vehicle Routing Problems (VRP) arise in many real-life applications wit...
Sin C. Ho, Dag Haugland
CIKM
2009
Springer
15 years 3 months ago
A comparative study of methods for estimating query language models with pseudo feedback
We systematically compare five representative state-of-theart methods for estimating query language models with pseudo feedback in ad hoc information retrieval, including two var...
Yuanhua Lv, ChengXiang Zhai