Sciweavers

1518 search results - page 173 / 304
» Cryptographic Test Correction
Sort
View
FLAIRS
2008
15 years 3 months ago
One-Pass Learning Algorithm for Fast Recovery of Bayesian Network
An efficient framework is proposed for the fast recovery of Bayesian network classifier. A novel algorithm, called Iterative Parent-Child learningBayesian Network Classifier (IPC-...
Shunkai Fu, Michel Desmarais, Fan Li
106
Voted
WSC
2007
15 years 3 months ago
Visualization of users' activities in a specific environment
Evaluation of user interface design is usually based on usability testing methods. In this paper we analyzed and described the user behavior in the form of the user model. The use...
Zdenek Mikovec, Ivo Malý, Pavel Slaví...
WSC
2008
15 years 3 months ago
Concurrent simulation and optimization models for mining planning
One of the most important challenges for mining engineers is to correctly analyze and generate short-term planning schedules, or simply month mining plan. The objective is to demo...
Marcelo Moretti Fioroni, Luiz Augusto Gago Franzes...
AMOST
2005
ACM
15 years 2 months ago
Early estimation of defect density using an in-process Haskell metrics model
Early estimation of defect density of a product is an important step towards the remediation of the problem associated with affordably guiding corrective actions in the software d...
Mark Sherriff, Nachiappan Nagappan, Laurie A. Will...
ADAEUROPE
2007
Springer
15 years 2 months ago
Automatic Ada Code Generation Using a Model-Driven Engineering Approach
Currently, Model-Driven Engineering (MDE) is considered one of the most promising approaches for software development. In this paper, a simple but complete example based on state-m...
Diego Alonso, Cristina Vicente-Chicote, Pedro S&aa...