Sciweavers

2006 search results - page 25 / 402
» Heuristic Security-Testing Methods
Sort
View
SDM
2007
SIAM
74views Data Mining» more  SDM 2007»
13 years 11 months ago
HACS: Heuristic Algorithm for Clustering Subsets
The term consideration set is used in marketing to refer to the set of items a customer thought about purchasing before making a choice. While consideration sets are not directly ...
Ding Yuan, W. Nick Street
WSC
1997
13 years 11 months ago
Weighted Jackknife-after-Bootstrap: A Heuristic Approach
We investigate the problem of deriving precision estimates for bootstrap quantities. The one major stipulation is that no further bootstrapping will be allowed. In 1992, Efron der...
Jin Wang, J. Sunil Rao, Jun Shao
OR
2005
Springer
14 years 3 months ago
Open Vehicle Routing Problem with Time Deadlines: Solution Methods and an Application
In the open route version of the well-known vehicle routing problem, vehicles are not required to return to the depot; or if they are required, then they return by traveling the sa...
Zeynep Özyurt, Deniz Aksen, Necati Aras
AAAI
2007
14 years 15 days ago
Heuristic Evaluation Functions for General Game Playing
A general game playing program plays games that it has not previously encountered. A game manager program sends the game playing programs a description of a game’s rules and obj...
James Clune
COCOON
2005
Springer
14 years 3 months ago
RIATA-HGT: A Fast and Accurate Heuristic for Reconstructing Horizontal Gene Transfer
Horizontal gene transfer (HGT) plays a major role in microbial genome diversification, and is claimed to be rampant among various groups of genes in bacteria. Further, HGT is a ma...
Luay Nakhleh, Derek A. Ruths, Li-San Wang