Sciweavers

1050 search results - page 151 / 210
» Towards programming for the non-technical
Sort
View
ER
1995
Springer
109views Database» more  ER 1995»
14 years 1 months ago
Reverse Engineering of Relational Database Applications
Abstract. This paper presents techniques for reverse engineering of relational database applications. The target of such an effort is the definition of a fully equipped object-orie...
Mark W. W. Vermeer, Peter M. G. Apers
ETD2000
1995
14 years 1 months ago
Automatic generation of a neural network architecture using evolutionary computation
This paper reports the application of evolutionary computation in the automatic generation of a neural network architecture.It is a usual practice to use trial and error to find a...
E. Vonk, Lakhmi C. Jain, L. P. J. Veelenturf, R. J...
ICRA
1995
IEEE
60views Robotics» more  ICRA 1995»
14 years 1 months ago
Sensorimotor Primitives for Robotic Assembly Skills
Integrating sensors into robot systems is an important step towards increasing the flexibility of robotic manufacturing systems. Current sensor integration is largely task-speciï...
J. Daniel Morrow, Pradeep K. Khosla
AMOST
2005
ACM
13 years 12 months ago
Early estimation of defect density using an in-process Haskell metrics model
Early estimation of defect density of a product is an important step towards the remediation of the problem associated with affordably guiding corrective actions in the software d...
Mark Sherriff, Nachiappan Nagappan, Laurie A. Will...
ISSA
2008
13 years 11 months ago
Password Management: Empirical Results from a RSA and USA Study
"The state of information security as a whole is a disaster, a train wreck". This view is given by Forte and Power (2007) describing the state of information security to...
Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Da...