Sciweavers

2006 search results - page 29 / 402
» Heuristic Security-Testing Methods
Sort
View
PATAT
2004
Springer
101views Education» more  PATAT 2004»
14 years 3 months ago
Fuzzy Multiple Heuristic Orderings for Examination Timetabling
In this paper, we address the issue of ordering exams by simultaneously considering two separate heuristics using fuzzy methods. Combinations of two of the following three heuristi...
Hishammuddin Asmuni, Edmund K. Burke, Jonathan M. ...
AMEC
2003
Springer
14 years 3 months ago
Choosing Samples to Compute Heuristic-Strategy Nash Equilibrium
Auctions define games of incomplete information for which it is often too hard to compute the exact Bayesian-Nash equilibrium. Instead, the infinite strategy space is often popu...
William E. Walsh, David C. Parkes, Rajarshi Das
AUSAI
2003
Springer
14 years 3 months ago
Guided Operators for a Hyper-Heuristic Genetic Algorithm
We have recently introduced a hyper-heuristic genetic algorithm (hyper-GA) with an adaptive length chromosome which aims to evolve an ordering of low-level heuristics so as to find...
Limin Han, Graham Kendall
CP
2007
Springer
14 years 4 months ago
Dynamic Management of Heuristics for Solving Structured CSPs
Abstract. This paper deals with the problem of solving efficiently structured CSPs. It is well known that (hyper)tree-decompositions offer the best approaches from a theoretical v...
Philippe Jégou, Samba Ndiaye, Cyril Terriou...
GECCO
2007
Springer
168views Optimization» more  GECCO 2007»
14 years 4 months ago
Sex and death: towards biologically inspired heuristics for constraint handling
Constrained continuous optimization is still an interesting field of research. Many heuristics have been proposed in the last decade. Most of them are based on penalty functions....
Oliver Kramer, Stephan Brügger, Dejan Lazovic