Sciweavers

1523 search results - page 102 / 305
» Detecting and Sketching the Common
Sort
View
EUSFLAT
2007
176views Fuzzy Logic» more  EUSFLAT 2007»
14 years 11 months ago
Modifying the Classic Peak Picking Technique Using a Fuzzy Multi Agent to Have an Accurate P300-based BCI
EEG-based brain computer interface (BCI) provides a new communication channel between the human brain and a computer. The classification of EEG data is an important task in EEG-ba...
Gholamreza Salimi Khorshidi, Ayyoub Jaafari, Ali M...
TPHOL
1993
IEEE
15 years 2 months ago
Some Theorems We Should Prove
Mathematical techniques can be used to produce precise, provably complete documentation for computer systems. However, such documents are highly detailed and oversights and other ...
David Lorge Parnas
PARCO
2007
14 years 11 months ago
Visualizing Parallel Functional Program Runs: Case Studies with the Eden Trace Viewer
executions in terms of Eden’s abstract units of computation instead of providing a machineoriented low level view like common tools for parallelism analysis do. We show how typic...
Jost Berthold, Rita Loogen
MICRO
2006
IEEE
117views Hardware» more  MICRO 2006»
15 years 4 months ago
PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection
Dynamic software bug detection tools are commonly used because they leverage run-time information. However, they suffer from a fundamental limitation, the Path Coverage Problem: t...
Shan Lu, Pin Zhou, Wei Liu, Yuanyuan Zhou, Josep T...
KBSE
2005
IEEE
15 years 3 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer