Sciweavers

1204 search results - page 189 / 241
» Using Machine Learning Techniques for Stylometry
Sort
View
DATE
2009
IEEE
107views Hardware» more  DATE 2009»
15 years 8 months ago
User-centric design space exploration for heterogeneous Network-on-Chip platforms
- In this paper, we present a design methodology for automatic platform generation of future heterogeneous systems where communication happens via the Network-onChip (NoC) approach...
Chen-Ling Chou, Radu Marculescu
ICRA
2009
IEEE
130views Robotics» more  ICRA 2009»
15 years 8 months ago
Model adaptation with least-squares SVM for adaptive hand prosthetics
— The state-of-the-art in control of hand prosthetics is far from optimal. The main control interface is represented by surface electromyography (EMG): the activation potentials ...
Francesco Orabona, Claudio Castellini, Barbara Cap...
ICSM
2008
IEEE
15 years 7 months ago
Automated severity assessment of software defect reports
In mission critical systems, such as those developed by NASA, it is very important that the test engineers properly recognize the severity of each issue they identify during testi...
Tim Menzies, Andrian Marcus
BLISS
2007
IEEE
15 years 7 months ago
Evolving the Face of a Criminal: How to Search a Face Space More Effectively
Witnesses and victims of serious crime are often required to construct a facial composite, a visual likeness of a suspect’s face. The traditional method is for them to select in...
Charlie D. Frowd, Vicki Bruce, Carol Gannon, Mark ...
ICC
2007
IEEE
141views Communications» more  ICC 2007»
15 years 7 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...