Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,028,039 papers from all fields of science
Search
Sign In
Create Free Account
Brute-force search
Known as:
Brute force search
, Uninformed search
, Brute force key search
Expand
In computer science, brute-force search or exhaustive search, also known as generate and test, is a very general problem-solving technique that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
A New Kind of Science
Algorithm design
Algorithmic efficiency
Backtracking
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Cuckoo Search and Firefly Algorithm Applied to Multilevel Image Thresholding
Ivona Brajević
,
M. Tuba
2014
Corpus ID: 59712030
Multilevel image thresholding is a technique widely used in image processing, most often for segmentation. Exhaustive search is…
Expand
Highly Cited
2008
Highly Cited
2008
Joint Power and Channel Allocation for Cognitive Radios
F. Digham
IEEE Wireless Communications and Networking…
2008
Corpus ID: 17202060
Spectrum scarcity is the major challenge facing all parties working in the telecommunications industry. As recently shown, the…
Expand
2004
2004
Biologically-Inspired Face Detection: Non-Brute-Force-Search Approach
Christian Siagian
,
L. Itti
Conference on Computer Vision and Pattern…
2004
Corpus ID: 8800229
We present a biologically-inspired face detection system. The system applies notions such as saliency, gist, and gaze to localize…
Expand
Highly Cited
2003
Highly Cited
2003
A built-in self-repair scheme for semiconductor memories with 2-d redundancy
Jin-Fu Li
,
J. Yeh
,
+4 authors
Eugene Chow
International Test Conference, . Proceedings. ITC…
2003
Corpus ID: 9667
Embedded memories are among the most widely used cores in current system-on-chip (SOC) implementations. Memory cores usually…
Expand
Highly Cited
1996
Highly Cited
1996
Regression testing of GUI event interactions
L. White
Proceedings of International Conference on…
1996
Corpus ID: 181179
Graphics user interface (GUI) design is an expected part of almost every contemporary software or computer project, and yet the…
Expand
Highly Cited
1991
Highly Cited
1991
Optimization of Multi-Way Join Queries for Parallel Execution
Hongjun Lu
,
M. Shan
,
K. Tan
Very Large Data Bases Conference
1991
Corpus ID: 6544741
Most of the existing relational database query optimizers generate multi-way join plans only from those linear ones to reduce the…
Expand
Highly Cited
1988
Highly Cited
1988
An improved protocol reachability analysis technique
G. Holzmann
Software, Practice & Experience
1988
Corpus ID: 9044940
An automated analysis of all reachable states in a distributed system can be used to trace obscure logical errors that would be…
Expand
Highly Cited
1978
Highly Cited
1978
The contour extraction problem with biomedical applications
G. Ashkar
,
J. Modestino
1978
Corpus ID: 60596911
Highly Cited
1966
Highly Cited
1966
Velocity profiles and eddy viscosity distributions downstream of a Mach 2.22 nozzle exhausting to quiescent air
J. Eggers
1966
Corpus ID: 117456318
Compressible, turbulent, axisymmetric mixing for velocity profiles and eddy viscosity distributions downstream of Mach 2.2 nozzle…
Expand
Highly Cited
1963
Highly Cited
1963
A State Variable Assignment Method for Asynchronous Sequential Switching Circuits
N. C.
,
LIu
,
Yorktown Heights
JACM
1963
Corpus ID: 12816872
A b.~tract. This paper describes a method of state variable assignment for asynchronous sequential switching circuits. The method…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE