Sciweavers

2006 search results - page 322 / 402
» Heuristic Security-Testing Methods
Sort
View
ECAI
2004
Springer
14 years 2 months ago
Adversarial Constraint Satisfaction by Game-Tree Search
Many decision problems can be modelled as adversarial constraint satisfaction, which allows us to integrate methods from AI game playing. In particular, by using the idea of oppone...
Kenneth N. Brown, James Little, Páidí...
GECCO
2004
Springer
129views Optimization» more  GECCO 2004»
14 years 2 months ago
Memetic Optimization of Video Chain Designs
Abstract. Improving image quality is the backbone of highly competitive display industry. Contemporary video processing system design is a challenging optimization problem. General...
Walid Ali, Alexander P. Topchy
GECCO
2004
Springer
131views Optimization» more  GECCO 2004»
14 years 2 months ago
PolyEDA: Combining Estimation of Distribution Algorithms and Linear Inequality Constraints
Estimation of distribution algorithms (EDAs) are population-based heuristic search methods that use probabilistic models of good solutions to guide their search. When applied to co...
Jörn Grahl, Franz Rothlauf
PARA
2004
Springer
14 years 2 months ago
A Family of High-Performance Matrix Multiplication Algorithms
During the last half-decade, a number of research efforts have centered around developing software for generating automatically tuned matrix multiplication kernels. These include ...
John A. Gunnels, Fred G. Gustavson, Greg Henry, Ro...
PCM
2004
Springer
236views Multimedia» more  PCM 2004»
14 years 2 months ago
Automatic Salient-Object Extraction Using the Contrast Map and Salient Points
In this paper, we propose a salient object extraction method using the contrast map and salient points for object-based image retrieval. In order to make the contrast map, we gener...
Soo Yeong Kwak, ByoungChul Ko, Hyeran Byun