Sciweavers

2517 search results - page 100 / 504
» Specifying Weak Sets
Sort
View
IJACTAICIT
2010
123views more  IJACTAICIT 2010»
15 years 2 months ago
A Hybrid Fault-Proneness Detection Approach Using Text Filtering and Static Code Analysis
We have proposed a fault-prone software module detection method using text-filtering approach, called Fault-proneness filtering. Even though the fault-proneness filtering achieved...
Osamu Mizuno, Hideaki Hata
IUI
2012
ACM
14 years 1 months ago
A visual programming language for designing interactions embedded in web-based geographic applications
Visual programming languages (VPLs) provide notations for representing both the intermediate and the final results of a knowledge engineering process. Whereas some VPLs particula...
The Nhan Luong, Patrick Etcheverry, Christophe Mar...
KDD
1999
ACM
199views Data Mining» more  KDD 1999»
15 years 9 months ago
The Application of AdaBoost for Distributed, Scalable and On-Line Learning
We propose to use AdaBoost to efficiently learn classifiers over very large and possibly distributed data sets that cannot fit into main memory, as well as on-line learning wher...
Wei Fan, Salvatore J. Stolfo, Junxin Zhang
MOR
2008
94views more  MOR 2008»
15 years 5 months ago
Metastable Equilibria
We define a refinement of Nash equilibria called metastability. This refinement supposes that the given game might be embedded within any global game that leaves its local best-rep...
Srihari Govindan, Robert Wilson
CAV
2005
Springer
122views Hardware» more  CAV 2005»
15 years 11 months ago
Interpolant-Based Transition Relation Approximation
Abstract. In predicate abstraction, exact image computation is problematic, requiring in the worst case an exponential number of calls to a decision procedure. For this reason, sof...
Ranjit Jhala, Kenneth L. McMillan