Sciweavers

2539 search results - page 406 / 508
» Debugging Method Names
Sort
View
JIPS
2007
100views more  JIPS 2007»
14 years 10 months ago
Static Type Assignment for SSA Form in CTOC
: Although the Java bytecode has numerous advantages, it also has certain shortcomings such as its slow execution speed and difficulty of analysis. In order to overcome such disadv...
Ki-Tae Kim, Weon-Hee Yoo
TSMC
2008
119views more  TSMC 2008»
14 years 10 months ago
An Efficient Binary-Decision-Diagram-Based Approach for Network Reliability and Sensitivity Analysis
Abstract--Reliability and sensitivity analysis is a key component in the design, tuning, and maintenance of network systems. Tremendous research efforts have been expended in this ...
Liudong Xing
TSP
2008
89views more  TSP 2008»
14 years 10 months ago
The Kernel Least-Mean-Square Algorithm
The combination of the famed kernel trick and the least-mean-square (LMS) algorithm provides an interesting sample by sample update for an adaptive filter in reproducing Kernel Hil...
Weifeng Liu, Puskal P. Pokharel, Jose C. Principe
BIOINFORMATICS
2004
99views more  BIOINFORMATICS 2004»
14 years 10 months ago
EST clustering error evaluation and correction
Motivation: The gene expression intensity information conveyed by (EST) Expressed Sequence Tag data can be used to infer important cDNA library properties, such as gene number and...
Ji-Ping Z. Wang, Bruce G. Lindsay 0002, James Leeb...
COMBINATORICS
2004
90views more  COMBINATORICS 2004»
14 years 9 months ago
Strings with Maximally Many Distinct Subsequences and Substrings
A natural problem in extremal combinatorics is to maximize the number of distinct subsequences for any length-n string over a finite alphabet ; this value grows exponentially, but...
Abraham Flaxman, Aram Wettroth Harrow, Gregory B. ...