Sciweavers

3544 search results - page 536 / 709
» Information Security in Open Systems
Sort
View
MSR
2005
ACM
15 years 4 months ago
Mining evolution data of a product family
Diversification of software assets through changing requirements impose a constant challenge on the developers and maintainers of large software systems. Recent research has addr...
Michael Fischer, Johann Oberleitner, Jacek Ratzing...
ICANN
2005
Springer
15 years 4 months ago
New Ears for a Robot Cricket
Cricket females perform phonotaxis towards the specific sounds produced by male crickets. By means of a well-tuned peripheral auditory system the cricket is able to extract direct...
Ben Torben-Nielsen, Barbara Webb, Richard E. Reeve
GECCO
2003
Springer
182views Optimization» more  GECCO 2003»
15 years 4 months ago
Modeling the Search Landscape of Metaheuristic Software Clustering Algorithms
Abstract. Software clustering techniques are useful for extracting architectural information about a system directly from its source code structure. This paper starts by examining ...
Brian S. Mitchell, Spiros Mancoridis
DEBS
2010
ACM
15 years 3 months ago
Logic-based representation, reasoning and machine learning for event recognition
Today’s organisations require techniques for automated transformation of the large data volumes they collect during their operations into operational knowledge. This requirement...
Alexander Artikis, Georgios Paliouras, Franç...
GREC
2009
Springer
15 years 2 months ago
A Performance Characterization Algorithm for Symbol Localization
In this paper we present an algorithm for performance characterization of symbol localization systems. This algorithm is aimed to be a more “reliable” and “open” solution t...
Mathieu Delalandre, Jean-Yves Ramel, Ernest Valven...