Sciweavers

2006 search results - page 67 / 402
» Heuristic Security-Testing Methods
Sort
View
120
Voted
EOR
2006
118views more  EOR 2006»
15 years 17 days ago
A random-key genetic algorithm for the generalized traveling salesman problem
The Generalized Traveling Salesman Problem is a variation of the well known Traveling Salesman Problem in which the set of nodes is divided into clusters; the objective is to find...
Lawrence V. Snyder, Mark S. Daskin
LOGCOM
2010
124views more  LOGCOM 2010»
14 years 11 months ago
Analytic Methods for the Logic of Proofs
The logic of proofs (LP) was proposed as Gödel’s missed link between Intuitionistic and S4-proofs, but so far the tableau-based methods proposed for LPhave not explored this cl...
Marcelo Finger
97
Voted
CG
2005
Springer
15 years 14 days ago
A polar-plane-based method for natural illumination of plants and trees
We introduce an illumination method for outdoor scenes containing plants and trees. Our method supports multiresolution plant and tree models based on random L-systems. The method...
Maria J. Vicent, Vicente Rosell, Roberto Viv&oacut...
93
Voted
ICSM
2002
IEEE
15 years 5 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
WCRE
2002
IEEE
15 years 5 months ago
Applying Spectral Methods to Software Clustering
The application of spectral methods to the software clustering problem has the advantage of producing results that are within a known factor of the optimal solution. Heuristic sea...
Ali Shokoufandeh, Spiros Mancoridis, Matthew Mayco...