Skip to search formSkip to main contentSkip to account menu

Brute-force search

Known as: Brute force search, Uninformed search, Brute force key search 
In computer science, brute-force search or exhaustive search, also known as generate and test, is a very general problem-solving technique that… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Multilevel image thresholding is a technique widely used in image processing, most often for segmentation. Exhaustive search is… 
Highly Cited
2008
Highly Cited
2008
Spectrum scarcity is the major challenge facing all parties working in the telecommunications industry. As recently shown, the… 
2004
2004
We present a biologically-inspired face detection system. The system applies notions such as saliency, gist, and gaze to localize… 
Highly Cited
2003
Highly Cited
2003
Embedded memories are among the most widely used cores in current system-on-chip (SOC) implementations. Memory cores usually… 
Highly Cited
1996
Highly Cited
1996
  • L. White
  • 1996
  • Corpus ID: 181179
Graphics user interface (GUI) design is an expected part of almost every contemporary software or computer project, and yet the… 
Highly Cited
1991
Highly Cited
1991
Most of the existing relational database query optimizers generate multi-way join plans only from those linear ones to reduce the… 
Highly Cited
1988
Highly Cited
1988
An automated analysis of all reachable states in a distributed system can be used to trace obscure logical errors that would be… 
Highly Cited
1978
Highly Cited
1966
Highly Cited
1966
Compressible, turbulent, axisymmetric mixing for velocity profiles and eddy viscosity distributions downstream of Mach 2.2 nozzle… 
Highly Cited
1963
Highly Cited
1963
A b.~tract. This paper describes a method of state variable assignment for asynchronous sequential switching circuits. The method…