Sciweavers

2006 search results - page 37 / 402
» Heuristic Security-Testing Methods
Sort
View
AIED
2005
Springer
14 years 3 months ago
Relation-based heuristic diffusion framework for LOM generation
Learning Object Metadata (LOM) intends to facilitate the retrieval and reuse of learning material. However, the fastidious task of authoring them limits their use. Motivated by thi...
Olivier Motelet
PATAT
2004
Springer
129views Education» more  PATAT 2004»
14 years 3 months ago
A Novel Similarity Measure for Heuristic Selection in Examination Timetabling
Metaheuristic approaches to examination timetabling problems are usually split up into two phases: initialisation phase in which a heuristic is employed to construct an initial sol...
Yong Yang, Sanja Petrovic
AAAI
1997
13 years 11 months ago
Beyond Contention: Extending Texture-Based Scheduling Heuristics
In order to apply texture measurement based heuristic commitment techniques beyond the unary capacity resource constraints of job shop scheduling, we extend the contention texture...
J. Christopher Beck, Andrew J. Davenport, Edward M...
ACL
1992
13 years 11 months ago
Corpus-Based Acquisition of Relative Pronoun Disambiguation Heuristics
This paper presents a corpus-based approach for deriving heuristics to locate the antecedents of relative pronouns. The technique dupficates the performance of hand-coded rules an...
Claire Cardie
EMNLP
2009
13 years 8 months ago
Improved Word Alignment with Statistics and Linguistic Heuristics
We present a method to align words in a bitext that combines elements of a traditional statistical approach with linguistic knowledge. We demonstrate this approach for Arabic-Engl...
Ulf Hermjakob