Sciweavers

2006 search results - page 274 / 402
» Heuristic Security-Testing Methods
Sort
View
SARA
2005
Springer
14 years 3 months ago
Solving the 24 Puzzle with Instance Dependent Pattern Databases
A pattern database (PDB) is a heuristic function in a form of a lookup table which stores the cost of optimal solutions for instances of subproblems. bproblems are generated by abs...
Ariel Felner, Amir Adler
GECCO
2005
Springer
154views Optimization» more  GECCO 2005»
14 years 3 months ago
Genetic algorithms using low-discrepancy sequences
The random number generator is one of the important components of evolutionary algorithms (EAs). Therefore, when we try to solve function optimization problems using EAs, we must ...
Shuhei Kimura, Koki Matsumura
ISLPED
2004
ACM
99views Hardware» more  ISLPED 2004»
14 years 3 months ago
Dynamic power management for streaming data
—This paper presents a method that uses data buffers to create long periods of idleness to exploit power management. This method considers the power consumed by the buffers and a...
Nathaniel Pettis, Le Cai, Yung-Hsiang Lu
ISPD
2004
ACM
161views Hardware» more  ISPD 2004»
14 years 3 months ago
Early-stage power grid analysis for uncertain working modes
High performance integrated circuits are now reaching the 100-plus watt regime, and power delivery and power grid signal integrity have become critical. Analyzing the performance ...
Haifeng Qian, Sani R. Nassif, Sachin S. Sapatnekar
MIR
2004
ACM
189views Multimedia» more  MIR 2004»
14 years 3 months ago
Repeating pattern discovery and structure analysis from acoustic music data
Music and songs usually have repeating patterns and prominent structure. The automatic extraction of such repeating patterns and structure is useful for further music summarizatio...
Lie Lu, Muyuan Wang, HongJiang Zhang