Sciweavers

2006 search results - page 74 / 402
» Heuristic Security-Testing Methods
Sort
View
133
Voted
APVIS
2011
14 years 18 days ago
Full-resolution interactive CPU volume rendering with coherent BVH traversal
We present an efficient method for volume rendering by raycasting on the CPU. We employ coherent packet traversal of an implicit bounding volume hierarchy, heuristically pruned u...
Aaron Knoll, Sebastian Thelen, Ingo Wald, Charles ...
ICPR
2006
IEEE
16 years 1 months ago
Machine Learning for Video Compression: Macroblock Mode Decision
Video Compression currently is dominated by engineering and fine-tuned heuristic methods. In this paper, we propose to instead apply the well-developed machinery of machine learni...
Christoph H. Lampert
89
Voted
AAAI
2007
15 years 2 months ago
Learning to Solve QBF
We present a novel approach to solving Quantified Boolean Formulas (QBF) that combines a search-based QBF solver with machine learning techniques. We show how classification met...
Horst Samulowitz, Roland Memisevic
IJCBDD
2008
113views more  IJCBDD 2008»
15 years 18 days ago
Parsimony accelerated Maximum Likelihood searches
: Phylogenetic search is a key tool used in a variety of biological research endeavors. However, this search problem is known to be computationally difficult, due to the astronomic...
Kenneth Sundberg, Timothy O'Connor, Hyrum Carroll,...
156
Voted
ISPD
2012
ACM
288views Hardware» more  ISPD 2012»
13 years 8 months ago
Construction of realistic gate sizing benchmarks with known optimal solutions
Gate sizing in VLSI design is a widely-used method for power or area recovery subject to timing constraints. Several previous works have proposed gate sizing heuristics for power ...
Andrew B. Kahng, Seokhyeong Kang