Sciweavers

2006 search results - page 84 / 402
» Heuristic Security-Testing Methods
Sort
View
AAAI
1998
15 years 2 months ago
An Integer Local Search Method with Application to Capacitated Production Planning
Production planning is an important task in manufacturing systems. We consider a real-world capacitated lot-sizing problem (CLSP) from the process industry. Because the problem re...
Joachim P. Walser, Ramesh Iyer, Narayan Venkatasub...
115
Voted
ENGL
2008
116views more  ENGL 2008»
15 years 21 days ago
A Low Cost Machine Translation Method for Cross-Lingual Information Retrieval
In one form or another language translation is a necessary part of cross-lingual information retrieval systems. Often times this is accomplished using machine translation systems....
David B. Bracewell, Fuji Ren, Shingo Kuroiwa
88
Voted
ICCAD
1997
IEEE
121views Hardware» more  ICCAD 1997»
15 years 4 months ago
Adaptive methods for netlist partitioning
An algorithm that remains in use at the core of many partitioning systems is the Kernighan-Lin algorithm and a variant the Fidducia-Matheysses (FM) algorithm. To understand the FM...
Wray L. Buntine, Lixin Su, A. Richard Newton, Andr...
89
Voted
DATE
2008
IEEE
78views Hardware» more  DATE 2008»
15 years 7 months ago
Simultaneous FU and Register Binding Based on Network Flow Method
– With the rapid increase of design complexity and the decrease of device features in nano-scale technologies, interconnection optimization in digital systems becomes more and mo...
Jason Cong, Junjuan Xu
ASYNC
1998
IEEE
100views Hardware» more  ASYNC 1998»
15 years 4 months ago
An Implicit Method for Hazard-Free Two-Level Logic Minimization
None of the available minimizers for exact 2-level hazard-free logic minimization can synthesize very large circuits. This limitation has forced researchers to resort to heuristic...
Michael Theobald, Steven M. Nowick