Sciweavers

2006 search results - page 62 / 402
» Heuristic Security-Testing Methods
Sort
View
TIFS
2010
120views more  TIFS 2010»
14 years 5 months ago
Quantitative Structural Steganalysis of Jsteg
Quantitative steganalysis strives to estimate the change rate defined as the relative number of embedding changes introduced by steganography. In this paper, we propose two new cla...
Jan Kodovský, Jessica J. Fridrich
GECCO
2009
Springer
146views Optimization» more  GECCO 2009»
15 years 5 months ago
Analyzing the landscape of a graph based hyper-heuristic for timetabling problems
Hyper-heuristics can be thought of as “heuristics to choose heuristics”. They are concerned with adaptively finding solution methods, rather than directly producing a solutio...
Gabriela Ochoa, Rong Qu, Edmund K. Burke
BIBE
2007
IEEE
110views Bioinformatics» more  BIBE 2007»
15 years 5 months ago
Discrete Methods for Association Search and Status Prediction in Genotype Case-Control Studies
Abstract—Recent improvements in high-throughput genotyping technology make possible genome-wide association studies and status prediction (classification) for common complex dis...
Dumitru Brinza, Alexander Zelikovsky
JAIR
2002
163views more  JAIR 2002»
14 years 10 months ago
Efficient Reinforcement Learning Using Recursive Least-Squares Methods
The recursive least-squares (RLS) algorithm is one of the most well-known algorithms used in adaptive filtering, system identification and adaptive control. Its popularity is main...
Xin Xu, Hangen He, Dewen Hu
CORR
2006
Springer
100views Education» more  CORR 2006»
14 years 11 months ago
Error Exponents of Low-Density Parity-Check Codes on the Binary Erasure Channel
-- We introduce a thermodynamic (large deviation) formalism for computing error exponents in error-correcting codes. Within this framework, we apply the heuristic cavity method fro...
Thierry Mora, Olivier Rivoire