Sciweavers

1518 search results - page 168 / 304
» Cryptographic Test Correction
Sort
View
113
Voted
VL
2002
IEEE
109views Visual Languages» more  VL 2002»
15 years 5 months ago
Assertions in End-User Software Engineering: A Think-Aloud Study
There has been little research on end-user program development beyond the programming phase. Devising ways to address additional phases may be critical, because research shows tha...
Christine Wallace, Curtis R. Cook, Jay Summet, Mar...
96
Voted
ADAEUROPE
2010
Springer
15 years 5 months ago
Practical Limits on Software Dependability: A Case Study
The technology for building dependable computing systems has advanced dramatically. Nevertheless, there is still no complete solution to building software for critical systems in w...
Patrick J. Graydon, John C. Knight, Xiang Yin
97
Voted
SSS
2009
Springer
133views Control Systems» more  SSS 2009»
15 years 5 months ago
A Metastability-Free Multi-synchronous Communication Scheme for SoCs
We propose a communication scheme for GALS systems with independent but approximately synchronized clock sources, which guarantees high-speed metastability-free communication betwe...
Thomas Polzer, Thomas Handl, Andreas Steininger
AGENTS
2001
Springer
15 years 5 months ago
Using background knowledge to speed reinforcement learning in physical agents
This paper describes Icarus, an agent architecture that embeds a hierarchical reinforcement learning algorithm within a language for specifying agent behavior. An Icarus program e...
Daniel G. Shapiro, Pat Langley, Ross D. Shachter
95
Voted
ICPR
2000
IEEE
15 years 5 months ago
Human Silhouette Recognition with Fourier Descriptors
A novel approach for human silhouette recognition is presented. The method is based on Fourier descriptors. We made an analysis of which and how many descriptors are enough to hav...
Rocío Díaz de León, Luis Enri...