Sciweavers

2006 search results - page 86 / 402
» Heuristic Security-Testing Methods
Sort
View
117
Voted
ICMCS
2009
IEEE
126views Multimedia» more  ICMCS 2009»
14 years 10 months ago
Sort-Merge feature selection and fusion methods for classification of unstructured video
We explore the problem of rapid automatic semantic tagging of video frames of unstructured (unedited) videos. We apply the Sort-Merge algorithm for feature selection on a large (&...
Mitchell J. Morris, John R. Kender
126
Voted
HICSS
2003
IEEE
200views Biometrics» more  HICSS 2003»
15 years 6 months ago
A Dynamic Assignment Problem in a Mobile System with Limited Bandwidth
The assignment problem originally arising from parallel and distributed computing has been investigated intensively since the 70’s when Harold Stone proposed a method to solve i...
Yang Wang 0006, Thomas Kunz
89
Voted
EOR
2006
44views more  EOR 2006»
15 years 19 days ago
The multiple-job repair kit problem
The repair kit problem is that of finding the optimal set of parts in the kit of a repairman. An important aspect of this problem, in many real-life situations, is that several jo...
Ruud H. Teunter
116
Voted
BMCBI
2008
139views more  BMCBI 2008»
15 years 22 days ago
A topological transformation in evolutionary tree search methods based on maximum likelihood combining p-ECR and neighbor joinin
Background: Inference of evolutionary trees using the maximum likelihood principle is NP-hard. Therefore, all practical methods rely on heuristics. The topological transformations...
Maozu Guo, Jian-Fu Li, Yang Liu
ASPDAC
1995
ACM
85views Hardware» more  ASPDAC 1995»
15 years 4 months ago
High-level synthesis scheduling and allocation using genetic algorithms
In this article a scheduling method is presented which is capable of allocating supplementary resources during scheduling. This makes it very suitable in synthesis strategies base...
Marc J. M. Heijligers, L. J. M. Cluitmans, Jochen ...