Sciweavers

2006 search results - page 27 / 402
» Heuristic Security-Testing Methods
Sort
View
FIW
1998
130views Communications» more  FIW 1998»
13 years 11 months ago
A Heuristic Approach to Detect Feature Interactions in Requirements
We present a method to systematically detect feature interactions in requirements, which are expressed as constraints on system event traces. We show its application on the lift sy...
Maritta Heisel, Jeanine Souquières
MP
2006
138views more  MP 2006»
13 years 10 months ago
A new ILP-based refinement heuristic for Vehicle Routing Problems
In the paper we address the Distance-Constrained Capacitated Vehicle Routing Problem (DCVRP), where k minimum-cost routes through a central depot have to be constructed so as to co...
Roberto De Franceschi, Matteo Fischetti, Paolo Tot...
ISCIS
2009
Springer
14 years 4 months ago
Construction of examination timetables based on ordering heuristics
—In this paper, we combine graph coloring heuristics, namely largest degree and saturation degree with the concept of a heuristic modifier under the framework of squeaky wheel op...
Syariza Abdul Rahman, Andrzej Bargiela, Edmund K. ...
CHI
2004
ACM
14 years 10 months ago
Using heuristics to evaluate the playability of games
Heuristics have become an accepted and widely used adjunct method of usability evaluation in Internet and software development. This report introduces Heuristic Evaluation for Pla...
Heather Desurvire, Martin Caplan, Jozsef A. Toth
ICCBR
2009
Springer
14 years 4 months ago
Improving Reinforcement Learning by Using Case Based Heuristics
This work presents a new approach that allows the use of cases in a case base as heuristics to speed up Reinforcement Learning algorithms, combining Case Based Reasoning (CBR) and ...
Reinaldo A. C. Bianchi, Raquel Ros, Ramon Ló...