Sciweavers

2006 search results - page 38 / 402
» Heuristic Security-Testing Methods
Sort
View
CSCLP
2005
Springer
14 years 3 months ago
Complexity Analysis of Heuristic CSP Search Algorithms
CSP search algorithms are exponential in the worst-case. A trivial upper bound on the time complexity of CSP search algorithms is O∗ (dn ), where n and d are the number of variab...
Igor Razgon
ISCIS
2005
Springer
14 years 3 months ago
Comparison of Hyper-DAG Based Task Mapping and Scheduling Heuristics for Wireless Sensor Networks
Abstract. In-network processing emerges as an approach to reduce energy consumption in Wireless Sensor Networks (WSN) by decreasing the overall transferred data volume. Parallel pr...
Yuan Tian, Füsun Özgüner, Eylem Eki...
SAT
2005
Springer
134views Hardware» more  SAT 2005»
14 years 3 months ago
A Clause-Based Heuristic for SAT Solvers
We propose a new decision heuristic for DPLL-based propositional SAT solvers. Its essence is that both the initial and the conflict clauses are arranged in a list and the next deci...
Nachum Dershowitz, Ziyad Hanna, Alexander Nadel
GECCO
2005
Springer
131views Optimization» more  GECCO 2005»
14 years 3 months ago
Statistical analysis of heuristics for evolving sorting networks
Designing efficient sorting networks has been a challenging combinatorial optimization problem since the early 1960’s. The application of evolutionary computing to this problem ...
Lee K. Graham, Hassan Masum, Franz Oppacher
IPPS
1994
IEEE
14 years 2 months ago
A Comparison of Heuristics for Scheduling DAGs on Multiprocessors
Many algorithms to schedule DAGs on multiprocessors have been proposed, but there has been little work done to determine their effectiveness. Since multi-processor scheduling is a...
Carolyn McCreary, A. A. Khan, J. J. Thompson, M. E...