Sciweavers

2006 search results - page 57 / 402
» Heuristic Security-Testing Methods
Sort
View
ECAI
2004
Springer
15 years 4 months ago
Postponing Branching Decisions
Abstract. Solution techniques for Constraint Satisfaction and Optimisation Problems often make use of backtrack search methods, exploiting variable and value ordering heuristics. I...
Willem Jan van Hoeve, Michela Milano
HEURISTICS
2010
14 years 5 months ago
An evolutionary and constructive approach to a crew scheduling problem in underground passenger transport
Operation management of underground passenger transport systems is associated with combinatorial optimization problems (known as crew and train scheduling and rostering) which bel...
Rafael Elizondo, Víctor Parada, Lorena Prad...
ICASSP
2011
IEEE
14 years 2 months ago
Robust Bayesian Analysis applied to Wiener filtering of speech
Commonly used speech enhancement algorithms estimate the power spectral density of the noise to be removed, or make a decision about the presence of speech in a particular frame, ...
Phil Spencer Whitehead, David V. Anderson
PROCEDIA
2011
14 years 1 months ago
Exact Closest String as a Constraint Satisfaction Problem
We report the first evaluation of Constraint Satisfaction as a computational framework for solving closest string problems. We show that careful consideration of symbol occurrenc...
Tom Kelsey, Lars Kotthoff
ACII
2011
Springer
13 years 11 months ago
Toward a Computational Model of Affective Responses to Stories for Augmenting Narrative Generation
Current approaches to story generation do not utilize models of human affect to create stories with dramatic arc, suspense, and surprise. This paper describes current and future wo...
Brian O'Neill