Sciweavers

2006 search results - page 17 / 402
» Heuristic Security-Testing Methods
Sort
View
ENDM
2010
167views more  ENDM 2010»
13 years 7 months ago
Column Generation based Primal Heuristics
In the past decade, significant progress has been achieved in developing generic primal heuristics that made their way into commercial mixed integer programming (MIP) solver. Exte...
C. Joncour, S. Michel, R. Sadykov, D. Sverdlov, Fr...
HICSS
2005
IEEE
149views Biometrics» more  HICSS 2005»
14 years 3 months ago
A Systems Model for Knowledge Management: A Rhetorical Heuristic Process
An Integrative Mental Model of Knowledge Management can provide a way of visualizing the interrelated elements that comprise a knowledge management system. This original model, bu...
Charles E. Beck, Gary R. Schornack
AAAI
2000
13 years 11 months ago
Sampling Methods for Action Selection in Influence Diagrams
Sampling has become an important strategy for inference in belief networks. It can also be applied to the problem of selecting actions in influence diagrams. In this paper, we pre...
Luis E. Ortiz, Leslie Pack Kaelbling
ICCAD
2001
IEEE
124views Hardware» more  ICCAD 2001»
14 years 7 months ago
Partition-Based Decision Heuristics for Image Computation Using SAT and BDDs
Methods based on Boolean satisfiability (SAT) typically use a Conjunctive Normal Form (CNF) representation of the Boolean formula, and exploit the structure of the given problem ...
Aarti Gupta, Zijiang Yang, Pranav Ashar, Lintao Zh...
HCI
2009
13 years 8 months ago
Heuristic Evaluations of Bioinformatics Tools: A Development Case
Heuristic evaluations are an efficient low cost method for identifying usability problems in a biomedical research tool. Combining the results of these evaluations with findings fr...
Barbara Mirel, Zach Wright