Sciweavers

6413 search results - page 1261 / 1283
» Classes of cycle bases
Sort
View
JSW
2008
106views more  JSW 2008»
13 years 9 months ago
Hierarchical Image Segmentation by Structural Content
Image quality loss resulting from artifacts depends on the nature and strength of the artifacts as well as the context or background in which they occur. In order to include the im...
Nathir A. Rawashdeh, Shaun T. Love, Kevin D. Donoh...
JMLR
2006
124views more  JMLR 2006»
13 years 9 months ago
Policy Gradient in Continuous Time
Policy search is a method for approximately solving an optimal control problem by performing a parametric optimization search in a given class of parameterized policies. In order ...
Rémi Munos
ENGL
2007
100views more  ENGL 2007»
13 years 9 months ago
Utilizing Computational Intelligence to Assist in Software Release Decision
—Defect tracking using computational intelligence methods is used to predict software readiness in this study. By comparing predicted number of faults and number of faults discov...
Tong-Seng Quah, Mie Mie Thet Thwin
JPDC
2006
141views more  JPDC 2006»
13 years 9 months ago
M-TREE: A high efficiency security architecture for protecting integrity and privacy of software
Secure processor architectures enable new sets of applications such as commercial grid computing, software copy protection and secure mobile agents by providing secure computing e...
Chenghuai Lu, Tao Zhang, Weidong Shi, Hsien-Hsin S...
ENTCS
2007
97views more  ENTCS 2007»
13 years 9 months ago
Safety-Oriented Design of Component Assemblies using Safety Interfaces
This paper promotes compositional reasoning in the context of safety-critical systems, and demonstrates a safety-oriented component model using an application from the automotive ...
Jonas Elmqvist, Simin Nadjm-Tehrani
« Prev « First page 1261 / 1283 Last » Next »