Sciweavers

357 search results - page 17 / 72
» A methodology for the selection of requirements engineering ...
Sort
View
CGO
2005
IEEE
14 years 1 months ago
Reactive Techniques for Controlling Software Speculation
Aggressive software speculation holds significant potential, because it enables program transformations to reduce the program’s critical path. Like any form of speculation, how...
Craig B. Zilles, Naveen Neelakantam
UIST
2005
ACM
14 years 1 months ago
Zliding: fluid zooming and sliding for high precision parameter manipulation
High precision parameter manipulation tasks typically require adjustment of the scale of manipulation in addition to the parameter itself. This paper introduces the notion of Zoom...
Gonzalo Ramos, Ravin Balakrishnan
VLSI
2010
Springer
13 years 2 months ago
Local Biasing and the Use of Nullator-Norator Pairs in Analog Circuits Designs
Although local biasing of components used in an analog circuit is shown to be a very attractive design methodology, significantly simplifying the design procedure [3], it makes the...
Reza Hashemian
GECCO
2005
Springer
126views Optimization» more  GECCO 2005»
14 years 1 months ago
Is negative selection appropriate for anomaly detection?
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algori...
Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, C...
IPM
2007
145views more  IPM 2007»
13 years 7 months ago
Text mining techniques for patent analysis
Patent documents contain important research results. However, they are lengthy and rich in technical terminology such that it takes a lot of human efforts for analyses. Automatic...
Yuen-Hsien Tseng, Chi-Jen Lin, Yu-I Lin