Sciweavers

929 search results - page 93 / 186
» heuristics 2008
Sort
View
ACSAC
2008
IEEE
14 years 3 months ago
On Purely Automated Attacks and Click-Based Graphical Passwords
We present and evaluate various methods for purely automated attacks against click-based graphical passwords. Our purely automated methods combine click-order heuristics with focu...
Amirali Salehi-Abari, Julie Thorpe, Paul C. van Oo...
CCGRID
2008
IEEE
14 years 3 months ago
Joint Communication and Computation Task Scheduling in Grids
In this paper we present a multicost algorithm for the joint time scheduling of the communication and computation resources that will be used by a task. The proposed algorithm sel...
Kostas Christodoulopoulos, Nikolaos D. Doulamis, E...
CEC
2008
IEEE
14 years 3 months ago
On the usefulness of infeasible solutions in evolutionary search: A theoretical study
— Evolutionary algorithms (EAs) have been widely used in optimization, where infeasible solutions are often encountered. Some EAs regard infeasible solutions as useless individua...
Yang Yu, Zhi-Hua Zhou
DATE
2008
IEEE
139views Hardware» more  DATE 2008»
14 years 3 months ago
Scan Chain Organization for Embedded Diagnosis
Keeping diagnostic resolution as high as possible while maximizing the compaction ratio is subject to research since the advent of embedded test. In this paper, we present a novel...
Melanie Elm, Hans-Joachim Wunderlich
IAT
2008
IEEE
14 years 3 months ago
Acquiring Vague Temporal Information from the Web
Many real–world information needs are naturally formulated as queries with temporal constraints. However, the structured temporal background information needed to support such c...
Steven Schockaert, Martine De Cock, Etienne E. Ker...