[PDF][PDF] Constraint satisfaction problems solved by semidefinite relaxations
M Ettaouil, C Loqman - WSEAS Transactions on Computers, 2008 - Citeseer
We consider the constraint satisfaction problem (CSP), where the values must be assigned
to variables which are subject to a set of constraints. This problem is naturally formulated as …
to variables which are subject to a set of constraints. This problem is naturally formulated as …
[PDF][PDF] Combinatorial optimization: mutual relations among graph algorithms
E Milkova - WSEAS Transactions on Mathematics, 2008 - academia.edu
The Theory of Graphs is a wonderful, practical discipline. Informatics has played a big part in
its development, and these two fields are strongly interconnected. This can, perhaps, mainly …
its development, and these two fields are strongly interconnected. This can, perhaps, mainly …
A penetration testing method for e-commerce authentication system security
W Pan, W Li - … International Conference on Management of e …, 2009 - ieeexplore.ieee.org
E-Commerce systems are suffering more and more security issues. Vulnerabilities of
authentication systems are revealed when various attacks and malicious abuses are …
authentication systems are revealed when various attacks and malicious abuses are …
Hybrid Machine Learning Methods with Malay Lexicon for Public Polarity Opinion on Water Related Issue
Opinion classifications from Twitter are still in demand among research works on related
opinions or feelings expressed on various issues. One of the concerns expressed in Twitter …
opinions or feelings expressed on various issues. One of the concerns expressed in Twitter …
[PDF][PDF] Design and implementation of soil spatial variation analysis system
G Lingling, Z Rongqun, Z Ming, Y Hui… - WSEAS Transactions on …, 2009 - wseas.us
The advantages of traditional integrated GIS (Geographic Information System) are integrate
each component of GIS and form independent complete system, for example ArcGIS and …
each component of GIS and form independent complete system, for example ArcGIS and …
Modeling trees with rugged surfaces
A Mizoguchi, K Miyata - … on Trust, Security and Privacy in …, 2011 - ieeexplore.ieee.org
In this study, a method for modeling trees with rugged surfaces by simulating tree growth is
proposed. The phenomena of cell division is considered for simulating tree growth. There …
proposed. The phenomena of cell division is considered for simulating tree growth. There …
Method of characterising a subsurface region using multiple point statistics
M Shahraeeni - US Patent 11,960,045, 2024 - Google Patents
Disclosed are methods of modelling a subsurface region. One method comprises defining a
plurality of variables for describing said subsurface region, each variable having a …
plurality of variables for describing said subsurface region, each variable having a …
[PDF][PDF] Benchmarking in digital circuit design automation
L JÓŹWIAK, D Gawłowski, A ŚLUSARCZYK - 2008 - wseas.us
This paper focuses on benchmarking, which is the main experimental approach to the
design method and EDA-tool analysis, characterization and evaluation. We discuss the …
design method and EDA-tool analysis, characterization and evaluation. We discuss the …
Model and Heuristic Algorithm for Steel Productive Resources Balance Problem
BL Zhou, Q Zhang - Advanced Materials Research, 2012 - Trans Tech Publ
A nonlinear model is proposed for balancing the steel productive resources. In the model,
the sharing and the competition between products and resources are presented, and four …
the sharing and the competition between products and resources are presented, and four …
A Novel Anomaly Detection Approach for Executable Program Security
W Pan, W Li, W Zhao - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
Anomaly detection of executable program is a security detection solution that examines
whether security violation issues exist in programs. The paper presents a novel anomaly …
whether security violation issues exist in programs. The paper presents a novel anomaly …