Sciweavers

2111 search results - page 289 / 423
» An Approach to Software Testing of Machine Learning Applicat...
Sort
View
165
Voted
ESORICS
2011
Springer
14 years 3 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
130
Voted
FOSSACS
2005
Springer
15 years 9 months ago
Branching Cells as Local States for Event Structures and Nets: Probabilistic Applications
We study the concept of choice for true concurrency models such as prime event structures and safe Petri nets. We propose a dynamic variation of the notion of cluster previously in...
Samy Abbes, Albert Benveniste
128
Voted
ISPASS
2006
IEEE
15 years 9 months ago
Comparing multinomial and k-means clustering for SimPoint
SimPoint is a technique used to pick what parts of the program’s execution to simulate in order to have a complete picture of execution. SimPoint uses data clustering algorithms...
Greg Hamerly, Erez Perelman, Brad Calder
116
Voted
EVOW
2006
Springer
15 years 7 months ago
Functional Classification of G-Protein Coupled Receptors, Based on Their Specific Ligand Coupling Patterns
Functional identification of G-Protein Coupled Receptors (GPCRs) is one of the current focus areas of pharmaceutical research. Although thousands of GPCR sequences are known, many ...
Burcu Bakir, Osman Ugur Sezerman
152
Voted
ECML
2005
Springer
15 years 9 months ago
Natural Actor-Critic
This paper investigates a novel model-free reinforcement learning architecture, the Natural Actor-Critic. The actor updates are based on stochastic policy gradients employing Amari...
Jan Peters, Sethu Vijayakumar, Stefan Schaal