Sciweavers

2006 search results - page 311 / 402
» Heuristic Security-Testing Methods
Sort
View
ICPR
2008
IEEE
14 years 3 months ago
Comparison of Particle Swarm Optimization and Genetic Algorithm for HMM training
Hidden Markov Model (HMM) is the dominant technology in speech recognition. The problem of optimizing model parameters is of great interest to the researchers in this area. The Ba...
Fengqin Yang, Changhai Zhang, Tieli Sun
ICPR
2008
IEEE
14 years 3 months ago
Topologically correct surface reconstruction using alpha shapes and relations to ball-pivoting
The problem to reconstruct a surface given a finite set of boundary points is of growing interest, e.g. in the context of laser range images. While a lot of heuristic methods hav...
Peer Stelldinger
ISCC
2008
IEEE
14 years 3 months ago
Scheduling high-rate sessions in Fractional Lambda Switching networks: Algorithm and analysis
This work addresses the high-rate session scheduling problem in Fractional Lambda Switching (FλS) networks. With its global phase synchronization and pipeline forwarding (PF) ope...
Thu-Huong Truong, Mario Baldi, Yoram Ofek
APSCC
2007
IEEE
14 years 3 months ago
An Agent Scheduling Optimization for Call Centers
A suitable assignment of agents to handle the workload at a call center is not easy to fulfill because it requires a combinatorial optimization with large solution space and the n...
Chiaki Hishinuma, Masaaki Kanakubo, Takuma Goto
IAT
2007
IEEE
14 years 3 months ago
Towards Automated Design of Multi-party Rational Exchange Security Protocols
It is only recently that rational exchange schemes have been considered as an alternative solution to the exchange problem. A rational exchange protocol cannot provide fairness bu...
Almudena Alcaide, Juan M. Estévez-Tapiador,...