Sciweavers

2006 search results - page 6 / 402
» Heuristic Security-Testing Methods
Sort
View
CAISE
2009
Springer
14 years 4 months ago
A Heuristic Method for Business Process Model Evaluation
In this paper, we present a heuristic approach for finding errors and possible improvements in business process models. First, we translate the information that is included in a m...
Volker Gruhn, Ralf Laue
ITC
1999
IEEE
107views Hardware» more  ITC 1999»
14 years 2 months ago
A high-level BIST synthesis method based on a region-wise heuristic for an integer linear programming
A high-level built-in self-test (BIST) synthesis involves several tasks such as system register assignment, interconnection assignment, and BIST register assignment. Existing high...
Han Bin Kim, Dong Sam Ha
NIPS
2007
13 years 11 months ago
Theoretical Analysis of Heuristic Search Methods for Online POMDPs
Planning in partially observable environments remains a challenging problem, despite significant recent advances in offline approximation techniques. A few online methods have a...
Stéphane Ross, Joelle Pineau, Brahim Chaib-...
ASPDAC
2008
ACM
91views Hardware» more  ASPDAC 2008»
14 years 4 days ago
Heuristic power/ground network and floorplan co-design method
It's a trend to consider power supply integrity at early stage to improve the design quality. In this paper, we propose a novel algorithm to optimize floorplan together with P...
Xiaoyi Wang, Jin Shi, Yici Cai, Xianlong Hong
IJCNLP
2005
Springer
14 years 3 months ago
Heuristic Methods for Reducing Errors of Geographic Named Entities Learned by Bootstrapping
Abstract. One of issues in the bootstrapping for named entity recognition is how to control annotation errors introduced at every iteration. In this paper, we present several heuri...
Seungwoo Lee, Gary Geunbae Lee