Sciweavers

2006 search results - page 5 / 402
» Heuristic Security-Testing Methods
Sort
View
HEURISTICS
2002
152views more  HEURISTICS 2002»
13 years 10 months ago
A Constraint-Based Method for Project Scheduling with Time Windows
This paper presents a heuristic algorithm for solving RCPSP/max, the resource constrained project scheduling problem with generalized precedence relations. The algorithm relies, a...
Amedeo Cesta, Angelo Oddi, Stephen F. Smith
COR
2004
85views more  COR 2004»
13 years 10 months ago
A heuristic method for large-scale multi-facility location problems
Abstract. A heuristic method for solving large-scale multi
Yuri Levin, Adi Ben-Israel
ECOOPW
1998
Springer
14 years 1 months ago
Providing Automatic Support for Heuristic Rules of Methods
In method-based software development, software engineers create artifacts based on the heuristic rules of the adopted method. Most CASE tools, however, do not actively assist soft...
Bedir Tekinerdogan, Mehmet Aksit
COR
1999
99views more  COR 1999»
13 years 9 months ago
Applications of modern heuristic search methods to pattern sequencing problems
This article describes applications of modern heuristic search methods to pattern sequencing problems, i.e., problems seeking for a permutation of the rows of a given matrix with r...
Andreas Fink, Stefan Voß
NLDB
2007
Springer
14 years 4 months ago
Developing Methods and Heuristics with Low Time Complexities for Filtering Spam Messages
In this paper, we propose methods and heuristics having high accuracies and low time complexities for filtering spam e-mails. The methods are based on the n-gram approach and a heu...
Tunga Güngör, Ali Çiltik