Sciweavers

2006 search results - page 13 / 402
» Heuristic Security-Testing Methods
Sort
View
MICRO
2000
IEEE
96views Hardware» more  MICRO 2000»
14 years 2 months ago
Instruction distribution heuristics for quad-cluster, dynamically-scheduled, superscalar processors
We investigate instruction distribution methods for quadcluster, dynamically-scheduled superscalar processors. We study a variety of methods with different cost, performance and c...
Amirali Baniasadi, Andreas Moshovos
LREC
2010
152views Education» more  LREC 2010»
13 years 11 months ago
Heuristic Word Alignment with Parallel Phrases
This paper presents a method for word alignment that uses parallel phrases from manually word aligned sentence pairs to align words in new texts. Experiments on an English
Maria Holmqvist
COMPSAC
2006
IEEE
14 years 4 months ago
Backtracking Algorithms and Search Heuristics to Generate Test Suites for Combinatorial Testing
Combinatorial covering arrays have been used in several testing approaches. This paper first discusses some existing methods for finding such arrays. Then a SAT-based approach a...
Jun Yan, Jian Zhang
AICT
2010
IEEE
216views Communications» more  AICT 2010»
13 years 1 months ago
A Simplified Method for Optimising Sequentially Processed Access Control Lists
Among the various options for implementing Internet packet filters in the form of Access Control Lists (ACLs), is the intuitive – but potentially crude – method of processing t...
Vic Grout, John Davies
ECAI
2010
Springer
13 years 11 months ago
Strengthening Landmark Heuristics via Hitting Sets
The landmark cut heuristic is perhaps the strongest known polytime admissible approximation of the optimal delete relaxation heuristic h+ . Equipped with this heuristic, a best-fir...
Blai Bonet, Malte Helmert