Sciweavers

102 search results - page 15 / 21
» Evaluating the Accuracy of Fault Localization Techniques
Sort
View
TEC
2008
115views more  TEC 2008»
13 years 7 months ago
Function Approximation With XCS: Hyperellipsoidal Conditions, Recursive Least Squares, and Compaction
An important strength of learning classifier systems (LCSs) lies in the combination of genetic optimization techniques with gradient-based approximation techniques. The chosen app...
Martin V. Butz, Pier Luca Lanzi, Stewart W. Wilson
TSE
2008
165views more  TSE 2008»
13 years 7 months ago
A Systematic Study of Failure Proximity
Software end users are the best testers, who keep revealing bugs in software that has undergone rigorous in-house testing. In order to leverage their testing efforts, failure repor...
Chao Liu 0001, Xiangyu Zhang, Jiawei Han
DAS
2008
Springer
13 years 9 months ago
Multi-oriented Text Line Extraction from Handwritten Arabic Documents
In this paper, we present a novel approach for the multi-oriented text line extraction from handwritten Arabic documents. After image pre-processing, the local orientations are de...
Nazih Ouwayed, Abdel Belaïd
INFOCOM
2007
IEEE
14 years 1 months ago
Insider Attacker Detection in Wireless Sensor Networks
— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Fang Liu, Xiuzhen Cheng, Dechang Chen
ICNP
2003
IEEE
14 years 28 days ago
Data Dissemination with Ring-Based Index for Wireless Sensor Networks
In current sensor networks, sensor nodes are capable of not only measuring real world phenomena, but also storing, processing and transferring these measurements. Many data dissem...
Wensheng Zhang, Guohong Cao, Thomas F. La Porta