Sciweavers

567 search results - page 28 / 114
» Regularized Policy Iteration
Sort
View
ESEM
2008
ACM
15 years 2 months ago
Iterative identification of fault-prone binaries using in-process metrics
Code churn, the amount of code change taking place within a software unit over time, has been correlated with fault-proneness in software systems. We investigate the use of code c...
Lucas Layman, Gunnar Kudrjavets, Nachiappan Nagapp...
ICPP
2008
IEEE
15 years 7 months ago
The MAP3S Static-and-Regular Mesh Simulation and Wavefront Parallel-Programming Patterns
— This paper presents the Simulation and Wavefront parallel-programming patterns of the MAP3S pattern-based parallel programming system for distributed-memory environments. Both ...
Robert Niewiadomski, José Nelson Amaral, Du...
AAAI
2007
15 years 2 months ago
Clustering with Local and Global Regularization
Clustering is an old research topic in data mining and machine learning communities. Most of the traditional clustering methods can be categorized local or global ones. In this pa...
Fei Wang, Changshui Zhang, Tao Li
90
Voted
CAV
2001
Springer
83views Hardware» more  CAV 2001»
15 years 5 months ago
Iterating Transducers
Regular languages have proved useful for the symbolic state exploration of infinite state systems. They can be used to represent infinite sets of system configurations; the tran...
Dennis Dams, Yassine Lakhnech, Martin Steffen
89
Voted
IPPS
1998
IEEE
15 years 4 months ago
Update Protocols and Iterative Scientific Applications
Software DSMs have been a research topic for over a decade. While good performance has been achieved in some cases, consistent performance has continued to elude researchers. This...
Peter J. Keleher