Experiments were conducted to test several hypotheses on methods for improving document classification for the malicious insider threat problem within the Intelligence Community. ...
Abstract. According to the No Free Lunch (NFL) theorems all blackbox algorithms perform equally well when compared over the entire set of optimization problems. An important proble...
In this paper we investigate and propose a fully automated technique to perform conformance checking of Java implementations against UML class diagrams. In our approach, we reused...
This work presents an evolutionary algorithm to reconstruct 3D objects based on images of them. In the proposed evolutionary algorithm, we describe a way to evolve 3D initial mode...
Renata L. M. E. do Rego, Hansenclever de F. Bassan...
In this paper we propose an efficient transient test generation method to comprehensively test analog circuits using minimum test time. A divide and conquer strategy is formulated...