Sciweavers

2006 search results - page 285 / 402
» Heuristic Security-Testing Methods
Sort
View
RIAO
2000
13 years 11 months ago
Allowing users to weight search terms
Informationretrieval systems typically weight the importance of search terms according to document and collection statistics (such as by using tf idf scores, where less commonterm...
Ronald Fagin, Yoëlle S. Maarek
CASCON
1996
126views Education» more  CASCON 1996»
13 years 11 months ago
Inter-class testing of O-O software in the presence of polymorphism
This paper1 describes an algorithm for testing polymorphic interactions between classes in object-oriented (O-O) software. We propose an Augmented Object Relationship Diagram (AOR...
Amit M. Paradkar
GECCO
2008
Springer
161views Optimization» more  GECCO 2008»
13 years 10 months ago
An evolutionary design technique for collective communications on optimal diameter-degree networks
Scheduling collective communications (CC) in networks based on optimal graphs and digraphs has been done with the use of the evolutionary techniques. Inter-node communication patt...
Jirí Jaros, Vaclav Dvorak
GECCO
2008
Springer
141views Optimization» more  GECCO 2008»
13 years 10 months ago
A study of NK landscapes' basins and local optima networks
We propose a network characterization of combinatorial fitness landscapes by adapting the notion of inherent networks proposed for energy surfaces [5]. We use the well-known fami...
Gabriela Ochoa, Marco Tomassini, Sébastien ...
GECCO
2008
Springer
141views Optimization» more  GECCO 2008»
13 years 10 months ago
Potential fitness for genetic programming
We introduce potential fitness, a variant of fitness function that operates in the space of schemata and is applicable to tree-based genetic programing. The proposed evaluation ...
Krzysztof Krawiec, PrzemysBaw Polewski