Sciweavers

2006 search results - page 16 / 402
» Heuristic Security-Testing Methods
Sort
View
IJCAI
1993
13 years 11 months ago
The Statistical Learning of Accurate Heuristics
Heuristics used by search algorithms are usually composed of more primitive functions which we call "features". A method for combining features is presented which is bas...
Anna Bramanti-Gregor, Henry W. Davis
BIBE
2007
IEEE
127views Bioinformatics» more  BIBE 2007»
14 years 4 months ago
A Heuristic for Phylogenetic Reconstruction Using Transposition
Abstract—Because of the advent of high-throughput sequencing and the consequent reduction in cost of sequencing, many organisms have been completely sequenced and most of their g...
Feng Yue, Meng Zhang, Jijun Tang
WSC
2004
13 years 11 months ago
A Meta-Heuristic Based on Simulated Annealing for Solving Multiple-Objective Problems in Simulation Optimization
This paper presents a new meta heuristic algorithm based on the search method called simulated annealing, and its application to solving multi objective simulation optimization pr...
Eduardo Alberto Avello, Felipe F. Baesler, Reinald...
CIE
2009
Springer
14 years 4 months ago
Computational Heuristics for Simplifying a Biological Model
Abstract. Computational biomodelers adopt either of the following approaches: build rich, as complete as possible models in an effort to obtain very realistic models, or on the co...
Ion Petre, Andrzej Mizera, Ralph-Johan Back
ICCAD
2001
IEEE
192views Hardware» more  ICCAD 2001»
14 years 7 months ago
BOOM - A Heuristic Boolean Minimizer
We present a two-level Boolean minimization tool (BOOM) based on a new implicant generation paradigm. In contrast to all previous minimization methods, where the implicants are ge...
Jan Hlavicka, Petr Fiser