Sciweavers

2006 search results - page 78 / 402
» Heuristic Security-Testing Methods
Sort
View
ET
2006
55views more  ET 2006»
15 years 2 months ago
Test Planning and Test Resource Optimization for Droplet-Based Microfluidic Systems
Recent years have seen the emergence of dropletbased microfluidic systems for safety-critical biomedical applications. In order to ensure reliability, microsystems incorporating m...
Fei Su, Sule Ozev, Krishnendu Chakrabarty
ICGA
2007
85views Optimization» more  ICGA 2007»
15 years 2 months ago
Searching Solitaire in Real Time
This article presents a new real-time heuristic search method for planning problems with distinct stages. Our multistage nested rollout algorithm allows the user to apply separate...
Ronald Bjarnason, Prasad Tadepalli, Alan Fern
JASIS
2011
124views more  JASIS 2011»
14 years 9 months ago
Ranking of Wikipedia articles in search engines revisited: Fair ranking for reasonable quality?
This paper aims to review the fiercely discussed question of whether the ranking of Wikipedia articles in search engines is justified by the quality of the articles. After an over...
Dirk Lewandowski, Ulrike Spree
HPCA
2011
IEEE
14 years 6 months ago
Bloom Filter Guided Transaction Scheduling
Contention management is an important design component to a transactional memory system. Without effective contention management to ensure forward progress, a transactional memory...
Geoffrey Blake, Ronald G. Dreslinski, Trevor N. Mu...
CEC
2010
IEEE
14 years 6 months ago
A hybrid genetic algorithm for rescue path planning in uncertain adversarial environment
— Efficient vehicle path planning in hostile environment to carry out rescue or tactical logistic missions remains very challenging. Most approaches reported so far relies on key...
Jean Berger, Khaled Jabeur, Abdeslem Boukhtouta, A...