Sciweavers

2362 search results - page 357 / 473
» A new approach to edge detection
Sort
View
CSMR
2005
IEEE
15 years 7 months ago
Tracing Cross-Cutting Requirements via Context-Based Constraints
In complex systems, it is difficult to identify which system element is involved in which requirement. In this article, we present a new approach for expressing and validating a ...
Felix Bübl, Michael Balser
DFT
2005
IEEE
64views VLSI» more  DFT 2005»
15 years 7 months ago
Implementation of Concurrent Checking Circuits by Independent Sub-circuits
The present paper proposes a new method for detecting arbitrary faults in a functional circuit when the set of codewords is limited and known in advance. The method is based on im...
Vladimir Ostrovsky, Ilya Levin
ICDE
2005
IEEE
108views Database» more  ICDE 2005»
15 years 7 months ago
Robust Identification of Fuzzy Duplicates
Detecting and eliminating fuzzy duplicates is a critical data cleaning task that is required by many applications. Fuzzy duplicates are multiple seemingly distinct tuples which re...
Surajit Chaudhuri, Venkatesh Ganti, Rajeev Motwani
CBSE
2004
Springer
15 years 6 months ago
Strategies for a Component-Based Self-adaptability Model in Peer-to-Peer Architectures
Abstract. Current peer-to-peer architectures are hardly resistant against unanticipated exceptions such as the failure of single peers. This can be justified by the absence of soph...
Sascha Alda, Armin B. Cremers
PPSN
2004
Springer
15 years 6 months ago
LS-CMA-ES: A Second-Order Algorithm for Covariance Matrix Adaptation
Abstract. Evolution Strategies, Evolutionary Algorithms based on Gaussian mutation and deterministic selection, are today considered the best choice as far as parameter optimizatio...
Anne Auger, Marc Schoenauer, Nicolas Vanhaecke