Sciweavers

2006 search results - page 89 / 402
» Heuristic Security-Testing Methods
Sort
View
CAV
2012
Springer
236views Hardware» more  CAV 2012»
13 years 3 months ago
Lock Removal for Concurrent Trace Programs
Abstract. We propose a trace-based concurrent program analysis to soundly remove redundant synchronizations such as locks while preserving the behaviors of the concurrent computati...
Vineet Kahlon, Chao Wang
104
Voted
ICML
1997
IEEE
16 years 1 months ago
A Probabilistic Analysis of the Rocchio Algorithm with TFIDF for Text Categorization
The Rocchio relevance feedback algorithm is one of the most popular and widely applied learning methods from information retrieval. Here, a probabilistic analysis of this algorith...
Thorsten Joachims
108
Voted
ICC
2007
IEEE
137views Communications» more  ICC 2007»
15 years 7 months ago
An Improved Topology Design Algorithm for Network Coding-Based Multicast Networks
— Future communication networks should be designed with the consideration of efficiently supporting intensive multicast applications. Network coding technique proposed recently ...
Kaikai Chi, Xiaohong Jiang, Susumu Horiguchi
111
Voted
ICOIN
2005
Springer
15 years 6 months ago
RWA on Scheduled Lightpath Demands in WDM Optical Transport Networks with Time Disjoint Paths
Abstract. In optical networks, traffic demands often demonstrate periodic nature for which time-overlapping property can be utilized in routing and wavelength assignment (RWA). A R...
Hyun Gi Ahn, Tae-Jin Lee, Min Young Chung, Hyunseu...
108
Voted
AI
2004
Springer
15 years 6 months ago
A Hybrid Schema for Systematic Local Search
Abstract. We present a new hybrid constraint solving schema which retains some systematicity of constructive search while incorporating the heuristic guidance and lack of commitmen...
William S. Havens, Bistra N. Dilkina