Sciweavers

2006 search results - page 287 / 402
» Heuristic Security-Testing Methods
Sort
View
CORR
2006
Springer
76views Education» more  CORR 2006»
13 years 9 months ago
Inconsistent parameter estimation in Markov random fields: Benefits in the computation-limited setting
Consider the problem of joint parameter estimation and prediction in a Markov random field: i.e., the model parameters are estimated on the basis of an initial set of data, and th...
Martin J. Wainwright
ENGL
2006
108views more  ENGL 2006»
13 years 9 months ago
A Fuzzy-Neuro Model for Normal Concrete Mix Design
: Concrete mix design is a process of proportioning the ingredients in right proportions. Though it is based on sound technical principles and heuristics, the entire process is not...
M. C. Nataraja, M. A. Jayaram, C. N. Ravikumar
EOR
2006
87views more  EOR 2006»
13 years 9 months ago
Applying machine based decomposition in 2-machine flow shops
The Shifting Bottleneck (SB) heuristic is among the most successful approximation methods for solving the Job Shop problem. It is essentially a machine based decomposition procedu...
Saral Mukherjee, A. K. Chatterjee
COMCOM
2007
84views more  COMCOM 2007»
13 years 9 months ago
A genetic approach for adding QoS to distributed virtual environments
Distributed Virtual Environment (DVE) systems have been designed last years as a set of distributed servers. These systems allow a large number of remote users to share a single 3...
Silvia Rueda, Pedro Morillo, Juan M. Orduña...
JCB
2008
170views more  JCB 2008»
13 years 9 months ago
Efficiently Identifying Max-Gap Clusters in Pairwise Genome Comparison
The spatial clustering of genes across different genomes has been used to study important problems in comparative genomics, from identification of operons to detection of homologo...
Xu Ling, Xin He, Dong Xin, Jiawei Han