Sciweavers

2006 search results - page 58 / 402
» Heuristic Security-Testing Methods
Sort
View
COLING
1994
15 years 11 days ago
Countability and Number in Japanese to English Machine Translation
This paper presents a heuristic method that uses information in the Japanese text along with knowledge of English countability and number stored in transfer dictionaries to determ...
Francis Bond, Kentaro Ogura, Satoru Ikehara
TOMS
2011
84views more  TOMS 2011»
14 years 6 months ago
A Supernodal Approach to Incomplete LU Factorization with Partial Pivoting
We present a new supernode-based incomplete LU factorization method to construct a preconditioner for solving sparse linear systems with iterative methods. The new algorithm is pr...
Xiaoye S. Li, Meiyue Shao
EURODAC
1995
IEEE
127views VHDL» more  EURODAC 1995»
15 years 2 months ago
Layout synthesis for datapath designs
DPLAYOUT is a layout synthesis tool for bit-sliced datapath designs targeting standard-cell libraries. We developed fast and efficient heuristics for placing the cells in a bit-s...
Naveen Buddi, Malgorzata Chrzanowska-Jeske, Charle...
AI
2012
Springer
13 years 6 months ago
Plan recognition in exploratory domains
This paper describes a challenging plan recognition problem that arises in environments in which agents engage widely in exploratory behavior, and presents new algorithms for eff...
Ya'akov Gal, Swapna Reddy, Stuart M. Shieber, Ande...
81
Voted
AAAI
2012
13 years 1 months ago
Security Games for Controlling Contagion
Many strategic actions carry a ‘contagious’ component beyond the immediate locale of the effort itself. Viral marketing and peacekeeping operations have both been observed to ...
Jason Tsai, Thanh H. Nguyen, Milind Tambe