Sciweavers

1675 search results - page 235 / 335
» The Value of a Good Name
Sort
View
GECCO
2006
Springer
148views Optimization» more  GECCO 2006»
14 years 15 days ago
A specification-based fitness function for evolutionary testing of object-oriented programs
Encapsulation of states in object-oriented programs hinders the search for test data using evolutionary testing. As client code is oblivious to the internal state of a server obje...
Yoonsik Cheon, Myoung Kim
GECCO
2006
Springer
207views Optimization» more  GECCO 2006»
14 years 15 days ago
Both robust computation and mutation operation in dynamic evolutionary algorithm are based on orthogonal design
A robust dynamic evolutionary algorithm (labeled RODEA), where both the robust calculation and mutation operator are based on an orthogonal design, is proposed in this paper. Prev...
Sanyou Y. Zeng, Rui Wang, Hui Shi, Guang Chen, Hug...
HASE
1998
IEEE
14 years 13 days ago
Design for Constraint Violation Detection in Safety-Critical Systems
In safety-critical systems, certain safety constraints must be satisfied before an operation can be performed. Such constraints typically depend on the state of the system at the ...
Satish Subramanian, Sanjai Rayadurgam, Wei-Tek Tsa...
KDD
2000
ACM
142views Data Mining» more  KDD 2000»
14 years 12 days ago
Automating exploratory data analysis for efficient data mining
Having access to large data sets for the purpose of predictive data mining does not guarantee good models, even when the size of the training data is virtually unlimited. Instead,...
Jonathan D. Becher, Pavel Berkhin, Edmund Freeman
PKDD
2000
Springer
151views Data Mining» more  PKDD 2000»
14 years 12 days ago
Discovery of Characteristic subgraph Patterns Using Relative Indexing and the Cascade Model
: Relational representation of objects using graphs reveals much information that cannot be obtained by attribute value representations alone. There are already many databases that...
Takashi Okada, Mayumi Oyama