Sciweavers

2006 search results - page 400 / 402
» Heuristic Security-Testing Methods
Sort
View
CEC
2010
IEEE
15 years 1 months ago
Gaussian Adaptation as a unifying framework for continuous black-box optimization and adaptive Monte Carlo sampling
Abstract— We present a unifying framework for continuous optimization and sampling. This framework is based on Gaussian Adaptation (GaA), a search heuristic developed in the late...
Christian L. Müller, Ivo F. Sbalzarini
114
Voted
CORR
2010
Springer
162views Education» more  CORR 2010»
15 years 23 days ago
Backward Reachability of Array-based Systems by SMT solving: Termination and Invariant Synthesis
The safety of infinite state systems can be checked by a backward reachability procedure. For certain classes of systems, it is possible to prove the termination of the procedure ...
Silvio Ghilardi, Silvio Ranise
95
Voted
INFORMS
2010
138views more  INFORMS 2010»
15 years 19 days ago
Pruning Moves
The concept of dominance among nodes of a branch-decision tree, although known since a long time, is not exploited by general-purpose Mixed-Integer Linear Programming (MILP) enume...
Matteo Fischetti, Domenico Salvagnin
MANSCI
2010
75views more  MANSCI 2010»
15 years 18 days ago
Ordering Behavior in Retail Stores and Implications for Automated Replenishment
Retail store managers may not follow order advices generated by an automated inventory replenishment system if their incentives differ from the cost minimization objective of the...
Karel H. van Donselaar, Vishal Gaur, Tom Van Woens...
134
Voted
SIGMOD
2010
ACM
208views Database» more  SIGMOD 2010»
15 years 17 days ago
An automated, yet interactive and portable DB designer
Tuning tools attempt to configure a database to achieve optimal performance for a given workload. Selecting an optimal set of physical structures is computationally hard since it ...
Ioannis Alagiannis, Debabrata Dash, Karl Schnaitte...