Sciweavers

2006 search results - page 99 / 402
» Heuristic Security-Testing Methods
Sort
View
ICIP
1994
IEEE
16 years 2 months ago
Document Image Decoding
It has been shown that the computation time of Document Image Decoding can be significantly reduced by employing heuristics in the search for the best decoding of a text line. In ...
Gary E. Kopec, Philip A. Chou
110
Voted
IPPS
2008
IEEE
15 years 7 months ago
SWAMP: Smith-Waterman using associative massive parallelism
One of the most commonly used tools by computational biologists is some form of sequence alignment. Heuristic alignment algorithms developed for speed and their multiple results s...
Shannon Steinfadt, Johnnie W. Baker
98
Voted
CEC
2007
IEEE
15 years 7 months ago
SAT-decoding in evolutionary algorithms for discrete constrained optimization problems
— For complex optimization problems, several population-based heuristics like Multi-Objective Evolutionary Algorithms have been developed. These algorithms are aiming to deliver ...
Martin Lukasiewycz, Michael Glaß, Christian ...
102
Voted
ICPADS
2006
IEEE
15 years 6 months ago
Critical Path and Area Based Scheduling of Parallel Task Graphs on Heterogeneous Platforms
While most parallel task graphs scheduling research has been done in the context of single homogeneous clusters, heterogeneous platforms have become prevalent and are extremely at...
Tchimou N'Takpé, Frédéric Sut...
ACG
2003
Springer
15 years 5 months ago
Monte-Carlo Go Developments
We describe two Go programs,  ¢¡¤£¦¥ and  ¢¡¤§¨£ , developed by a Monte-Carlo approach that is simpler than Bruegmann’s (1993) approach. Our method is based on Abra...
Bruno Bouzy, Bernard Helmstetter