Sciweavers

564 search results - page 48 / 113
» Generating Test Data for Functions with Pointer Inputs
Sort
View
IJISTA
2008
95views more  IJISTA 2008»
15 years 3 months ago
Mining manufacturing data using genetic algorithm-based feature set decomposition
Data mining methods can be used for discovering interesting patterns in manufacturing databases. These patterns can be used to improve manufacturing processes. However, data accum...
Lior Rokach
ISBI
2011
IEEE
14 years 7 months ago
Automatic mask generation using independent component analysis in dynamic contrast enhanced-MRI
Studying image intensity change in each pixel in dynamic contrast enhanced (DCE)-MRI data enables differentiation of different tissue types based on their difference in contrast u...
Hatef Mehrabian, Ian Pang, Chaitanya Chandrana, Ra...
ICASSP
2008
IEEE
15 years 9 months ago
A method for locating multiple sources from a frame of a large-aperture microphone array data without tracking
In this paper we present a new method for locating multiple sound sources using only a local segment of data from a large-aperture microphone array. The result of this work may be...
Hoang Do, Harvey F. Silverman
ICCTA
2007
IEEE
15 years 7 months ago
Register Sharing Verification During Data-Path Synthesis
The variables of the high-level specifications and the automatically generated temporary variables are mapped on to the data-path registers during data-path synthesis phase of hig...
Chandan Karfa, Chittaranjan A. Mandal, Dipankar Sa...
85
Voted
ACSC
2004
IEEE
15 years 7 months ago
Detecting Privacy and Ethical Sensitivity in Data Mining Results
Knowledge discovery allows considerable insight into data. This brings with it the inherent risk that what is inferred may be private or ethically sensitive. The process of genera...
Peter Fule, John F. Roddick