Sciweavers

475 search results - page 87 / 95
» Z3-Connectivity with Independent Number 2
Sort
View
ENGL
2007
100views more  ENGL 2007»
13 years 11 months ago
Utilizing Computational Intelligence to Assist in Software Release Decision
—Defect tracking using computational intelligence methods is used to predict software readiness in this study. By comparing predicted number of faults and number of faults discov...
Tong-Seng Quah, Mie Mie Thet Thwin
COMPGEOM
1995
ACM
14 years 2 months ago
The Rectangle Enclosure and Point-Dominance Problems Revisited
We consider the problem of reporting the pairwise enclosures in a set of n axesparallel rectangles in IR2, which is equivalent to reporting dominance pairs in a set of n points in...
Prosenjit Gupta, Ravi Janardan, Michiel H. M. Smid...
COLT
2008
Springer
14 years 21 days ago
Almost Tight Upper Bound for Finding Fourier Coefficients of Bounded Pseudo- Boolean Functions
A pseudo-Boolean function is a real-valued function defined on {0, 1}n . A k-bounded function is a pseudo-Boolean function that can be expressed as a sum of subfunctions each of w...
Sung-Soon Choi, Kyomin Jung, Jeong Han Kim
AAAI
1996
14 years 6 days ago
Improved Limited Discrepancy Search
We present an improvement to Harvey and Ginsberg's limited discrepancy search algorithm, which eliminates much of the redundancy in the original, by generating each path from...
Richard E. Korf
BMCBI
2010
132views more  BMCBI 2010»
13 years 11 months ago
Next generation tools for genomic data generation, distribution, and visualization
Background: With the rapidly falling cost and availability of high throughput sequencing and microarray technologies, the bottleneck for effectively using genomic analysis in the ...
David A. Nix, Tonya L. Di Sera, Brian K. Dalley, B...