Sciweavers

7124 search results - page 1239 / 1425
» Programming Languages and Operating Systems
Sort
View
145
Voted
CORR
2010
Springer
152views Education» more  CORR 2010»
14 years 12 months ago
Evolutionary Approach to Test Generation for Functional BIST
In the paper, an evolutionary approach to test generation for functional BIST is considered. The aim of the proposed scheme is to minimize the test data volume by allowing the dev...
Y. A. Skobtsov, D. E. Ivanov, V. Y. Skobtsov, Raim...
126
Voted
HRI
2012
ACM
13 years 10 months ago
ROS and Rosbridge: roboticists out of the loop
The advent of ROS, the Robot Operating System, has finally made it possible to implement and use state-of-the-art navigation and manipulation algorithms on widely-available, inex...
Christopher Crick, Graylin Jay, Sarah Osentoski, O...
103
Voted
ECSQARU
2007
Springer
15 years 8 months ago
Syntactic Propositional Belief Bases Fusion with Removed Sets
Abstract. The problem of merging multiple sources information is central in several domains of computer science. In knowledge representation for artificial intelligence, several a...
Julien Hué, Odile Papini, Eric Würbel
117
Voted
DSOM
2003
Springer
15 years 7 months ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...
COMPSAC
1996
IEEE
15 years 6 months ago
Business Rule Extraction from Legacy Code
Business rules are operational rules that business organizationsfollow to peq%rm various activities. Over time, business rules evolve and the software that implemented them are al...
Hai Huang, Wei-Tek Tsai, Sourav Bhattacharya, Xiao...
« Prev « First page 1239 / 1425 Last » Next »