Sciweavers

2006 search results - page 331 / 402
» Heuristic Security-Testing Methods
Sort
View
FQAS
2004
Springer
135views Database» more  FQAS 2004»
14 years 29 days ago
Interactive Schema Integration with Sphinx
Abstract. The Internet has instigated a critical need for automated tools that facilitate integrating countless databases. Since non-technical end users are often the ultimate repo...
François Barbançon, Daniel P. Mirank...
ER
2006
Springer
112views Database» more  ER 2006»
14 years 28 days ago
A DAG Comparison Algorithm and Its Application to Temporal Data Warehousing
Abstract. We present a new technique for discovering and representing structural changes between two versions of a directed acyclic graph (DAG). Motivated by the necessity of chang...
Johann Eder, Karl Wiggisser
GECCO
2006
Springer
147views Optimization» more  GECCO 2006»
14 years 27 days ago
Deceptiveness and neutrality the ND family of fitness landscapes
When a considerable number of mutations have no effects on fitness values, the fitness landscape is said neutral. In order to study the interplay between neutrality, which exists ...
William Beaudoin, Sébastien Vérel, P...
GECCO
2006
Springer
182views Optimization» more  GECCO 2006»
14 years 27 days ago
Distributed genetic algorithm for energy-efficient resource management in sensor networks
In this work we consider energy-efficient resource management in an environment monitoring and hazard detection sensor network. Our goal is to allocate different detection methods...
Qinru Qiu, Qing Wu, Daniel J. Burns, Douglas Holzh...
GECCO
2006
Springer
205views Optimization» more  GECCO 2006»
14 years 27 days ago
Alternative evolutionary algorithms for evolving programs: evolution strategies and steady state GP
In contrast with the diverse array of genetic algorithms, the Genetic Programming (GP) paradigm is usually applied in a relatively uniform manner. Heuristics have developed over t...
L. Darrell Whitley, Marc D. Richards, J. Ross Beve...