Sciweavers

6059 search results - page 74 / 1212
» A Technique for Verifying Measurements
Sort
View
SQJ
2002
90views more  SQJ 2002»
14 years 11 months ago
Critical Analysis of the PIE Testability Technique
Abstract. The work of Voas and colleagues has introduced, refined and applied the propagation, infection and execution (PIE) analysis technique for measuring testability of program...
Zuhoor A. Al-Khanjari, Martin R. Woodward, Haider ...
ICML
2007
IEEE
16 years 21 days ago
Map building without localization by dimensionality reduction techniques
This paper proposes a new map building framework for mobile robot named Localization-Free Mapping by Dimensionality Reduction (LFMDR). In this framework, the robot map building is...
Takehisa Yairi
MICRO
1992
IEEE
99views Hardware» more  MICRO 1992»
15 years 4 months ago
An investigation of the performance of various dynamic scheduling techniques
An important design decision in the implementation of a superscalar processor is the amount of hardware to allocate to the instruction scheduling mechanism. Dynamic scheduling pro...
Michael Butler, Yale N. Patt
EAAI
2007
90views more  EAAI 2007»
14 years 12 months ago
AI techniques in modelling, assignment, problem solving and optimization
This paper recapitulates the results of a long research on a family of artificial intelligence (AI) methods—relying on, e.g., artificial neural networks and search techniques...
Zsolt János Viharos, Zsolt Kemény
IAJIT
2010
196views more  IAJIT 2010»
14 years 10 months ago
A modified high capacity image steganography technique based on wavelet transform
: Steganography is the art and science of concealing information in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. It is an application under informati...
Ali Al-Ataby, Fawzi Al-Naima