Sciweavers

2421 search results - page 104 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
OTM
2007
Springer
15 years 6 months ago
Semantic Matching Based on Enterprise Ontologies
Semantic Web technologies have in recent years started to also find their way into the world of commercial enterprises. Enterprise ontologies can be used as a basis for determinin...
Andreas Billig, Eva Blomqvist, Feiyu Lin
96
Voted
SIGSOFT
2007
ACM
16 years 1 months ago
Training on errors experiment to detect fault-prone software modules by spam filter
The fault-prone module detection in source code is of importance for assurance of software quality. Most of previous fault-prone detection approaches are based on software metrics...
Osamu Mizuno, Tohru Kikuno
104
Voted
ICRA
2002
IEEE
128views Robotics» more  ICRA 2002»
15 years 5 months ago
Generation of a Task Model by Integrating Multiple Observations of Human Demonstrations
This paper describes a new approach on how to teach a robot everyday manipulation tasks under the “Learning from Observation” framework. Most of the approaches so far assume t...
Koichi Ogawara, Jun Takamatsu, Hiroshi Kimura, Kat...
EDCC
2005
Springer
15 years 6 months ago
A Data Mining Approach to Identify Key Factors in Dependability Experiments
Abstract. Our paper presents a novel approach for identifying the key infrastructural factors determining the behavior of systems in the presence of faults by the application of in...
Gergely Pintér, Henrique Madeira, Marco Vie...
102
Voted
IAW
2003
IEEE
15 years 6 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...