Sciweavers

598 search results - page 49 / 120
» Typing the Numeric Tower
Sort
View
ICSM
2003
IEEE
14 years 2 months ago
Source-Based Software Risk Assessment
The paper reports on a method for software risk assessments that takes into account “primary facts” and “secondary facts”. Primary facts are those obtained through automat...
Arie van Deursen, Tobias Kuipers
CDC
2009
IEEE
119views Control Systems» more  CDC 2009»
14 years 1 months ago
Output feedback strategies for systems with impulsive and fast controls
— This paper deals with output feedback impulse control under set-membership uncertainty where the control realization consists of a sequence of δ-impulses. It indicates solutio...
Alexander N. Daryin, Irina A. Digailova, Alexander...
EMO
2001
Springer
100views Optimization» more  EMO 2001»
14 years 1 months ago
Fuzzy Evolutionary Hybrid Metaheuristic for Network Topology Design
Abstract. Topology design of enterprise networks is a hard combinatorial optimization problem. It has numerous constraints, several objectives, and a very noisy solution space. Bes...
Habib Youssef, Sadiq M. Sait, Salman A. Khan
ILP
2001
Springer
14 years 1 months ago
Learning Functions from Imperfect Positive Data
The Bayesian framework of learning from positive noise-free examples derived by Muggleton [12] is extended to learning functional hypotheses from positive examples containing norma...
Filip Zelezný
ANSS
1998
IEEE
14 years 1 months ago
On Interval Weighted Three-Layer Neural Networks
In solving application problems, the data sets used to train a neural network may not be hundred percent precise but within certain ranges. Representing data sets with intervals, ...
Mohsen Beheshti, Ali Berrached, André de Ko...