Sciweavers

509 search results - page 31 / 102
» clear 2006
Sort
View
79
Voted
RTCSA
2006
IEEE
15 years 3 months ago
Automatic Generation and Validation of Models of Legacy Software
The modeling approach is not used to its full potential in maintenance of legacy systems. Often, models do not even exist. The main reasons being that the economic implications an...
Joel Huselius, Johan Andersson, Hans Hansson, Sasi...
ACIVS
2006
Springer
15 years 3 months ago
Alternative Fuzzy Clustering Algorithms with L1-Norm and Covariance Matrix
In fuzzy clustering, the fuzzy c-means (FCM) algorithm is the best known and most used method. Although FCM is a very useful method, it is sensitive to noise and outliers so that W...
Miin-Shen Yang, Wen-Liang Hung, Tsiung-Iou Chung
ACOM
2006
Springer
15 years 3 months ago
Adaptiveness in Agent Communication: Application and Adaptation of Conversation Patterns
Communication in multi-agent systems (MASs) is usually governed by agent communication languages (ACLs) and communication protocols carrying a clear cut semantics. With an increasi...
Felix A. Fischer, Michael Rovatsos, Gerhard Wei&sz...
63
Voted
ASPDAC
2006
ACM
97views Hardware» more  ASPDAC 2006»
15 years 3 months ago
Object duplication for improving reliability
— Soft errors are becoming a common problem in current systems due to the scaling of technology that results in the use of smaller devices, lower voltages, and power-saving techn...
Guilin Chen, Mahmut T. Kandemir, Narayanan Vijaykr...
ASSETS
2006
ACM
15 years 3 months ago
Accessibility now!: teaching accessible computing at the introductory level
As ASSETS attendees, we are clearly interested in promoting accessibility in computing. One way to do this is to teach courses on the topic. Most such courses are aimed at upper-l...
Brian J. Rosmaita