Sciweavers

2006 search results - page 31 / 402
» Heuristic Security-Testing Methods
Sort
View
IPPS
2005
IEEE
14 years 3 months ago
MaTCH : Mapping Data-Parallel Tasks on a Heterogeneous Computing Platform Using the Cross-Entropy Heuristic
We propose in this paper a heuristic for mapping a set of interacting tasks of a parallel application onto a heterogeneous computing platform such as a computational grid. Our nov...
Soumya Sanyal, Sajal K. Das
BMCBI
2005
158views more  BMCBI 2005»
13 years 10 months ago
Automated generation of heuristics for biological sequence comparison
Background: Exhaustive methods of sequence alignment are accurate but slow, whereas heuristic approaches run quickly, but their complexity makes them more difficult to implement. ...
Guy St. C. Slater, Ewan Birney
AUSAI
2005
Springer
14 years 3 months ago
A Multi-exchange Heuristic for a Production Location Problem
In this work, we develop a multi-exchange heuristic based on an estimation improvement graph embedded in a simulated annealing to solve a problem arising in plant location planning...
Yunsong Guo, Yanzhi Li, Andrew Lim, Brian Rodrigue...
DAGM
2007
Springer
14 years 4 months ago
Comparison of Adaptive Spatial Filters with Heuristic and Optimized Region of Interest for EEG Based Brain-Computer-Interfaces
Research on EEG based brain-computer-interfaces (BCIs) aims at steering devices by thought. Even for simple applications, BCIs require an extremely effective data processing to wo...
Christian Liefhold, Moritz Grosse-Wentrup, Klaus G...
ACCV
2006
Springer
14 years 4 months ago
Heuristic Pre-clustering Relevance Feedback in Region-Based Image Retrieval
Relevance feedback (RF) and region-based image retrieval (RBIR) are two widely used methods to enhance the performance of contentbased image retrieval (CBIR) systems. In this paper...
Wan-Ting Su, Wen-Sheng Chu, James Jenn-Jier Lien