Sciweavers

2006 search results - page 3 / 402
» Heuristic Security-Testing Methods
Sort
View
AIPS
2011
13 years 1 months ago
Effective Heuristics and Belief Tracking for Planning with Incomplete Information
Conformant planning can be formulated as a path-finding problem in belief space where the two main challenges are the heuristics to guide the search, and the representation and u...
Alexandre Albore, Miquel Ramírez, Hector Ge...
COR
2011
13 years 5 months ago
Size-reduction heuristics for the unrelated parallel machines scheduling problem
In this paper we study the unrelated parallel machines problem where n independent jobs must be assigned to one out of m parallel machines and the processing time of each job di...
Luis Fanjul-Peyro, Rubén Ruiz
SIGIR
2010
ACM
13 years 4 months ago
Three web-based heuristics to determine a person's or institution's country of origin
We propose three heuristics to determine the country of origin of a person or institution via text-based IE from the Web. We evaluate all methods on a collection of music artists ...
Markus Schedl, Klaus Seyerlehner, Dominik Schnitze...
IHI
2010
133views Healthcare» more  IHI 2010»
13 years 5 months ago
Heuristic evaluation of persuasive health technologies
Persuasive technologies for promoting physical fitness, good nutrition, and other healthy behaviors have been growing in popularity. Despite their appeal, the evaluation of these ...
Julie A. Kientz, Eun Kyoung Choe, Brennen Birch, R...
SIGIR
2012
ACM
12 years 17 days ago
An exploration of ranking heuristics in mobile local search
Users increasingly rely on their mobile devices to search local entities, typically businesses, while on the go. Even though recent work has recognized that the ranking signals in...
Yuanhua Lv, Dimitrios Lymberopoulos, Qiang Wu