Sciweavers

567 search results - page 28 / 114
» Regularized Policy Iteration
Sort
View
ESEM
2008
ACM
13 years 9 months ago
Iterative identification of fault-prone binaries using in-process metrics
Code churn, the amount of code change taking place within a software unit over time, has been correlated with fault-proneness in software systems. We investigate the use of code c...
Lucas Layman, Gunnar Kudrjavets, Nachiappan Nagapp...
ICPP
2008
IEEE
14 years 2 months ago
The MAP3S Static-and-Regular Mesh Simulation and Wavefront Parallel-Programming Patterns
— This paper presents the Simulation and Wavefront parallel-programming patterns of the MAP3S pattern-based parallel programming system for distributed-memory environments. Both ...
Robert Niewiadomski, José Nelson Amaral, Du...
AAAI
2007
13 years 10 months ago
Clustering with Local and Global Regularization
Clustering is an old research topic in data mining and machine learning communities. Most of the traditional clustering methods can be categorized local or global ones. In this pa...
Fei Wang, Changshui Zhang, Tao Li
CAV
2001
Springer
83views Hardware» more  CAV 2001»
14 years 1 days ago
Iterating Transducers
Regular languages have proved useful for the symbolic state exploration of infinite state systems. They can be used to represent infinite sets of system configurations; the tran...
Dennis Dams, Yassine Lakhnech, Martin Steffen
IPPS
1998
IEEE
13 years 11 months ago
Update Protocols and Iterative Scientific Applications
Software DSMs have been a research topic for over a decade. While good performance has been achieved in some cases, consistent performance has continued to elude researchers. This...
Peter J. Keleher