Sciweavers

2006 search results - page 400 / 402
» Heuristic Security-Testing Methods
Sort
View
CEC
2010
IEEE
13 years 8 months ago
Gaussian Adaptation as a unifying framework for continuous black-box optimization and adaptive Monte Carlo sampling
Abstract— We present a unifying framework for continuous optimization and sampling. This framework is based on Gaussian Adaptation (GaA), a search heuristic developed in the late...
Christian L. Müller, Ivo F. Sbalzarini
CORR
2010
Springer
162views Education» more  CORR 2010»
13 years 7 months ago
Backward Reachability of Array-based Systems by SMT solving: Termination and Invariant Synthesis
The safety of infinite state systems can be checked by a backward reachability procedure. For certain classes of systems, it is possible to prove the termination of the procedure ...
Silvio Ghilardi, Silvio Ranise
INFORMS
2010
138views more  INFORMS 2010»
13 years 7 months ago
Pruning Moves
The concept of dominance among nodes of a branch-decision tree, although known since a long time, is not exploited by general-purpose Mixed-Integer Linear Programming (MILP) enume...
Matteo Fischetti, Domenico Salvagnin
MANSCI
2010
75views more  MANSCI 2010»
13 years 7 months ago
Ordering Behavior in Retail Stores and Implications for Automated Replenishment
Retail store managers may not follow order advices generated by an automated inventory replenishment system if their incentives differ from the cost minimization objective of the...
Karel H. van Donselaar, Vishal Gaur, Tom Van Woens...
SIGMOD
2010
ACM
208views Database» more  SIGMOD 2010»
13 years 7 months ago
An automated, yet interactive and portable DB designer
Tuning tools attempt to configure a database to achieve optimal performance for a given workload. Selecting an optimal set of physical structures is computationally hard since it ...
Ioannis Alagiannis, Debabrata Dash, Karl Schnaitte...