Sciweavers

5344 search results - page 74 / 1069
» Privacy-Preserving Set Operations
Sort
View
ISSRE
2002
IEEE
14 years 2 months ago
Inter-Class Mutation Operators for Java
The effectiveness of mutation testing depends heavily on the types of faults that the mutation operators are designed to represent. Therefore, the quality of the mutation operator...
Yu-Seung Ma, Yong Rae Kwon, Jeff Offutt
ECEASST
2008
121views more  ECEASST 2008»
13 years 10 months ago
Analyzing Semantic Properties of OCL Operations by Uncovering Interoperational Relationships
The OCL (Object Constraint Language) as part of the UML (Unified Modeling Language) is a rich language with different collection kinds (sets, multi-sets, sequences) and a large var...
Mirco Kuhlmann, Martin Gogolla
HICSS
2007
IEEE
382views Biometrics» more  HICSS 2007»
14 years 4 months ago
Using Computer Simulation in Operating Room Management: Impacts on Process Engineering and Performance
Operating rooms are regarded as the most costly hospital facilities. Due to rising costs and decreasing reimbursements, it is necessary to optimize the efficiency of the operating...
Andre S. Baumgart, Anja Zöller, Christof Denz...
EVOW
2004
Springer
14 years 3 months ago
A Comparison of Adaptive Operator Scheduling Methods on the Traveling Salesman Problem
Abstract. The implementation of an evolutionary algorithm necessarily involves the selection of an appropriate set of genetic operators. For many real-world problem domains, an inc...
Wouter Boomsma
IFSA
2003
Springer
89views Fuzzy Logic» more  IFSA 2003»
14 years 3 months ago
Lattice Fuzzy Signal Operators and Generalized Image Gradients
In this paper we use concepts from the lattice-based theory of morphological operators and fuzzy sets to develop generalized lattice image operators that are nonlinear convolutions...
Petros Maragos, Vassilis Tzouvaras, Giorgos B. Sta...