Sciweavers

7522 search results - page 1164 / 1505
» Spacing memetic algorithms
Sort
View
ICSM
2005
IEEE
15 years 9 months ago
A Safe Regression Test Selection Technique for Database-Driven Applications
Regression testing is a widely-used method for checking whether modifications to software systems have adversely affected the overall functionality. This is potentially an expens...
David Willmor, Suzanne M. Embury
SMA
2005
ACM
167views Solid Modeling» more  SMA 2005»
15 years 9 months ago
Boolean operations on 3D selective Nef complexes: optimized implementation and experiments
Nef polyhedra in d-dimensional space are the closure of half-spaces under boolean set operation. In consequence, they can represent non-manifold situations, open and closed sets, ...
Peter Hachenberger, Lutz Kettner
EUROCRYPT
2005
Springer
15 years 9 months ago
Floating-Point LLL Revisited
The Lenstra-Lenstra-Lov´asz lattice basis reduction algorithm (LLL or L3 ) is a very popular tool in public-key cryptanalysis and in many other fields. Given an integer d-dimensi...
Phong Q. Nguyen, Damien Stehlé
GECCO
2005
Springer
124views Optimization» more  GECCO 2005»
15 years 9 months ago
Evolving petri nets to represent metabolic pathways
Given concentrations of metabolites over a sequence of time steps, the metabolic pathway prediction problem seeks a set of reactions and rate constants for them that could yield t...
Jeremiah Nummela, Bryant A. Julstrom
ATAL
2005
Springer
15 years 9 months ago
Discovering strategic multi-agent behavior in a robotic soccer domain
2. THE MASM ALGORITHM An input to the MASM algorithm is a time-annotated multi-agent action sequence. The action sequence is then transformed into an action graph. An action graph ...
Andraz Bezek
« Prev « First page 1164 / 1505 Last » Next »