Sciweavers

370 search results - page 71 / 74
» TRUST-TECH Based Neural Network Training
Sort
View
ECAI
2000
Springer
13 years 10 months ago
Similarity-based Approach to Relevance Learning
In several information retrieval (IR) systems there is a possibility for user feedback. Many machine learning methods have been proposed that learn from the feedback information in...
Rickard Cöster, Lars Asker
ENGL
2007
100views more  ENGL 2007»
13 years 6 months ago
Utilizing Computational Intelligence to Assist in Software Release Decision
—Defect tracking using computational intelligence methods is used to predict software readiness in this study. By comparing predicted number of faults and number of faults discov...
Tong-Seng Quah, Mie Mie Thet Thwin
CASES
2006
ACM
14 years 21 hour ago
Automatic performance model construction for the fast software exploration of new hardware designs
Developing an optimizing compiler for a newly proposed architecture is extremely difficult when there is only a simulator of the machine available. Designing such a compiler requ...
John Cavazos, Christophe Dubach, Felix V. Agakov, ...
AIIDE
2006
13 years 7 months ago
The NERO Video Game
In most modern video games, character behavior is scripted; no matter how many times the player exploits a weakness, that weakness is never repaired. Yet if game characters could ...
Kenneth O. Stanley, Igor Karpov, Risto Miikkulaine...
AC
2003
Springer
13 years 9 months ago
Influence of Location over Several Classifiers in 2D and 3D Face Verification
In this paper two methods for human face recognition and the influence of location mistakes are shown. First one, Principal Components Analysis (PCA), has been one of the most appl...
Susana Mata, Cristina Conde, Araceli Sánche...