Sciweavers

2006 search results - page 18 / 402
» Heuristic Security-Testing Methods
Sort
View
ICPR
2008
IEEE
14 years 4 months ago
A new method to obtain the shift-table in Boyer-Moore's string matching algorithm
The Boyer-Moore algorithm uses two pre-computed tables for searching a string: skip, which utilizes the occurrence heuristic of symbols in a pattern, and shift, which utilizes the...
Yang Wang
DICTA
2007
13 years 11 months ago
An in Depth Comparison of Four Texture Segmentation Methods
Texture segmentation is the process of partitioning an image into regions with different textures containing similar group of pixels. This paper presents a comparative study of fo...
Vamsi Krishna Madasu, Prasad K. D. V. Yarlagadda
ICIP
2006
IEEE
14 years 11 months ago
A Heuristic Binarization Algorithm for Documents with Complex Background
This paper proposes a new method for binarization of digital documents. The proposed approach performs binarization by using a heuristic algorithm with two different thresholds an...
George D. C. Cavalcanti, Eduardo F. A. Silva, Cleb...
AAAI
1998
13 years 11 months ago
A Feature-Based Learning Method for Theorem Proving
Automatedreasoning or theorem proving essentially amounts to solving search problems. Despite significant progress in recent years theorem provers still have manyshortcomings. The...
Matthias Fuchs
AAAI
2010
13 years 11 months ago
To Max or Not to Max: Online Learning for Speeding Up Optimal Planning
It is well known that there cannot be a single "best" heuristic for optimal planning in general. One way of overcoming this is by combining admissible heuristics (e.g. b...
Carmel Domshlak, Erez Karpas, Shaul Markovitch