Adaptive control approach for software quality improvement [[electronic resource] /] / editors, W. Eric Wong, Bojan Cukic
| Adaptive control approach for software quality improvement [[electronic resource] /] / editors, W. Eric Wong, Bojan Cukic |
| Pubbl/distr/stampa | New Jersey, : World Scientific, 2011 |
| Descrizione fisica | 1 online resource (308 p.) |
| Disciplina | 005.14 |
| Altri autori (Persone) |
WongW. Eric
CukicBojan |
| Collana | Series on software engineering and knowledge engineering |
| Soggetto topico |
Software engineering
Computer software - Development |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-283-43372-9
9786613433725 981-4340-92-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Preface; CONTENTS; 1. Prioritizing Coverage-Oriented Testing Process - An Adaptive-Learning-Based Approach and Case Study Fevzi Belli, Mubariz Eminov, Nida G ok ce and W. Eric Wong; 1. Introduction and Related Work; 2. Background; 2.1. Event Sequence Graphs; 2.2. Neural Network-Based Clustering; 3. Competitive Learning; 3.1. Distance-Based Competitive Learning Algorithm; 3.2. Angle-Based Competitive Learning Algorithm; 3.3. Adaptive Competitive Learning; Adaptive Competitive Learning Algorithm; 4. Prioritized ESG-Based Testing; 4.1. Definition of the Attributes of Events
4.2. Definition of Importance Degree and PreferenceIndirect Determination of the Preference Degree; 5. A Case Study; 5.1. Derivation of the Test Cases; 5.2. Determination of Attributes of Events; 5.3. Construction of the Groups of Events; 5.4. Indirect Determination of Preference Degrees; 6. Conclusions and Future Work; References; 2. Statistical Evaluation Methods for V&V of Neuro-Adaptive Systems Y. Liu, J. Schumann and B. Cukic; 1. Introduction; 2. V&V of Neuro-Adaptive Systems; 2.1. Static V&V Approaches; 2.2. Dynamic V&V Approaches; 2.3. V&V of Neural Networks 3. Statistical Evaluation of Neuro-Adaptive Systems3.1. Neural Network-Based Flight Control; 3.2. The Neural Networks; 3.2.1. Dynamic Cell Structure Network; 3.2.2. Sigma-Pi Neural Network; 3.3. Failure Detection Using Support Vector Data Description; 3.4. Evaluating Network's Learning Performance; 3.4.1. A Sensitivity Metric for DCS Networks; 3.4.2. A Sensitivity Metric for Sigma-Pi Networks; 3.5. Evaluating the Network's Output Quality; 3.5.1. Validity Index for DCS Networks; 3.5.2. Bayesian Confidence Tool for Sigma-Pi Networks; 4. Conclusions; References 3. Adaptive Random Testing Dave Towey1. Introduction; 2. Adaptive Random Testing; 2.1. Distance-Based Adaptive Random Testing; 2.2. Restriction-Based Adaptive Random Testing; 2.3. Overheads; 2.4. Filtering; 2.5. Forgetting; 2.6. Mirror ART; 2.7. Probabilistic ART; 2.8. Fuzzy ART; 3. Summary; Acknowledgements; References; 4. Transparent Shaping: A Methodology for Adding Adaptive Behavior to Existing Software Systems and Applications S. Masoud Sadjadi, Philip K. Mckinley and Betty H.C. Cheng; 1. Introduction; 2. Basic Elements; 3. General Approach; 4. Middleware-Based Transparent Shaping 4.1. ACT Architectural Overview4.2. ACT Core Components; Dynamic Interceptors; Proxies; Decision Makers; 4.3. ACT Operation; 4.4. ACT/J Implementation; 4.5. ACT/J Case Study; 5. Language-Based Transparent Shaping; 5.1. TRAP/J Architectural Overview; 5.2. TRAP/J Run-Time Model; 5.3. TRAP/J Case Study; Making ASA Adapt-Ready; Compile-Time Actions; Generated Aspect; Generated Wrapper-Level Class; Generated Metalevel Class; Adapting to Loss Rate; Balancing QoS and Energy Consumption; 6. Discussion; 7. Conclusions and Future Work; Acknowledgements; References 5. Rule Extraction to Understand Changes in an Adaptive System Marjorie A. Darrah and Brian J. Taylor |
| Record Nr. | UNINA-9910457436603321 |
| New Jersey, : World Scientific, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Adaptive control approach for software quality improvement [[electronic resource] /] / editors, W. Eric Wong, Bojan Cukic
| Adaptive control approach for software quality improvement [[electronic resource] /] / editors, W. Eric Wong, Bojan Cukic |
| Pubbl/distr/stampa | New Jersey, : World Scientific, 2011 |
| Descrizione fisica | 1 online resource (308 p.) |
| Disciplina | 005.14 |
| Altri autori (Persone) |
WongW. Eric
CukicBojan |
| Collana | Series on software engineering and knowledge engineering |
| Soggetto topico |
Software engineering
Computer software - Development |
| ISBN |
1-283-43372-9
9786613433725 981-4340-92-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Preface; CONTENTS; 1. Prioritizing Coverage-Oriented Testing Process - An Adaptive-Learning-Based Approach and Case Study Fevzi Belli, Mubariz Eminov, Nida G ok ce and W. Eric Wong; 1. Introduction and Related Work; 2. Background; 2.1. Event Sequence Graphs; 2.2. Neural Network-Based Clustering; 3. Competitive Learning; 3.1. Distance-Based Competitive Learning Algorithm; 3.2. Angle-Based Competitive Learning Algorithm; 3.3. Adaptive Competitive Learning; Adaptive Competitive Learning Algorithm; 4. Prioritized ESG-Based Testing; 4.1. Definition of the Attributes of Events
4.2. Definition of Importance Degree and PreferenceIndirect Determination of the Preference Degree; 5. A Case Study; 5.1. Derivation of the Test Cases; 5.2. Determination of Attributes of Events; 5.3. Construction of the Groups of Events; 5.4. Indirect Determination of Preference Degrees; 6. Conclusions and Future Work; References; 2. Statistical Evaluation Methods for V&V of Neuro-Adaptive Systems Y. Liu, J. Schumann and B. Cukic; 1. Introduction; 2. V&V of Neuro-Adaptive Systems; 2.1. Static V&V Approaches; 2.2. Dynamic V&V Approaches; 2.3. V&V of Neural Networks 3. Statistical Evaluation of Neuro-Adaptive Systems3.1. Neural Network-Based Flight Control; 3.2. The Neural Networks; 3.2.1. Dynamic Cell Structure Network; 3.2.2. Sigma-Pi Neural Network; 3.3. Failure Detection Using Support Vector Data Description; 3.4. Evaluating Network's Learning Performance; 3.4.1. A Sensitivity Metric for DCS Networks; 3.4.2. A Sensitivity Metric for Sigma-Pi Networks; 3.5. Evaluating the Network's Output Quality; 3.5.1. Validity Index for DCS Networks; 3.5.2. Bayesian Confidence Tool for Sigma-Pi Networks; 4. Conclusions; References 3. Adaptive Random Testing Dave Towey1. Introduction; 2. Adaptive Random Testing; 2.1. Distance-Based Adaptive Random Testing; 2.2. Restriction-Based Adaptive Random Testing; 2.3. Overheads; 2.4. Filtering; 2.5. Forgetting; 2.6. Mirror ART; 2.7. Probabilistic ART; 2.8. Fuzzy ART; 3. Summary; Acknowledgements; References; 4. Transparent Shaping: A Methodology for Adding Adaptive Behavior to Existing Software Systems and Applications S. Masoud Sadjadi, Philip K. Mckinley and Betty H.C. Cheng; 1. Introduction; 2. Basic Elements; 3. General Approach; 4. Middleware-Based Transparent Shaping 4.1. ACT Architectural Overview4.2. ACT Core Components; Dynamic Interceptors; Proxies; Decision Makers; 4.3. ACT Operation; 4.4. ACT/J Implementation; 4.5. ACT/J Case Study; 5. Language-Based Transparent Shaping; 5.1. TRAP/J Architectural Overview; 5.2. TRAP/J Run-Time Model; 5.3. TRAP/J Case Study; Making ASA Adapt-Ready; Compile-Time Actions; Generated Aspect; Generated Wrapper-Level Class; Generated Metalevel Class; Adapting to Loss Rate; Balancing QoS and Energy Consumption; 6. Discussion; 7. Conclusions and Future Work; Acknowledgements; References 5. Rule Extraction to Understand Changes in an Adaptive System Marjorie A. Darrah and Brian J. Taylor |
| Record Nr. | UNINA-9910778809003321 |
| New Jersey, : World Scientific, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer Engineering and Networking : Proceedings of the 2013 International Conference on Computer Engineering and Network (CENet2013) / / edited by W. Eric Wong, Tingshao Zhu
| Computer Engineering and Networking : Proceedings of the 2013 International Conference on Computer Engineering and Network (CENet2013) / / edited by W. Eric Wong, Tingshao Zhu |
| Edizione | [1st ed. 2014.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
| Descrizione fisica | 1 online resource (1356 p.) |
| Disciplina | 621.382 |
| Collana | Lecture Notes in Electrical Engineering |
| Soggetto topico |
Electrical engineering
Computer organization Computers Communications Engineering, Networks Computer Systems Organization and Communication Networks Information Systems and Communication Service |
| ISBN |
9783319017662
3319017667 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Volume I -- Part I: Algorithm Design -- Simulation Algorithm of Adaptive Scheduling in missile-borne Phased Array Radar -- A Second-order Algorithm for Curve Parallel Projection on Parametric Surfaces.-Computation Method of Processing Time based on BP Neural Network and Genetic Algorithm -- Integral Sliding Mode Controller for an Uncertain Network Control System with Delay -- Synthesis of Linear Antenna Array using Genetic Algorithm to Control Side Lobe Level -- Wavelet Analysis Combined with Artificial Neural Network for Predicting Protein-protein Interactions -- Application Analysis of Slot Allocation Algorithm for Link16 -- An Improved Cluster Head Algorithm for Wireless Sensor Network -- An Ant Colony System for Dynamic Voltage Scaling Problem in Heterogeneous System -- An Improved Ant Colony System for Task Scheduling Problem in Heterogeneous Distributed System -- Optimization of Green Agri-food Supply Chain Network Using Particle Swarm Optimization Algorithm -- A New Model for Short-term Power System Load Forecasting using Wavelet Transform Fuzzy RBF Neural Network -- Energy Effective Frequency Based Adaptive Sampling Algorithm for Clustered Wireless Sensor Network -- An Indoor Three-dimensional Positioning Algorithm Based on Difference Received Signal Strength in WiFi -- The Universal Approximation Capability of Double Flexible Approximate Identity Neural Networks -- A Novel and Realtime Hand Tracking Algorithm for Gesture Manipulation -- A Transforming Quantum-inspired Genetic Algorithm for Optimization of Green Agricultural Products Supply Chain Network -- A Shortest Path Algorithm Suitable for Navigation Software -- An Energy-Balanced Clustering Routing Algorithm for Wireless Sensor Networks -- Simulation and Analysis of Binary Frequency Shift Keying Noise Cancel Adaptive Filter Based on Least Mean Square Error Algorithm -- Density-Sensitive Semi-Supervised Affinity Propagation Clustering -- The Implementation of A Hybrid Particle Swarm Optimization Algorithm Based on Three-level Parallel Model -- Optimization of Inverse Planning Based on an Improved Non-dominated Neighbor-based Selection in Intensity Modulated Radiation Therapy -- A Recommendation System for Paper Submission Based on Vertical Search Engine -- Analysis and Improvement of SPRINT Algorithm Based on Hadoop -- Prediction Model for Trend of Web Sentiment Using Extension Neural Network and Nonparametric Auto-regression Method -- K-optimal Chaos Ant Colony Algorithm and Its Application on Dynamic Route Guidance System -- A Certainty-based Active Learning Framework of Meeting Speech Summarization -- Application of Improved BP Neural Network in the Frequency Identification of Piano Tone -- Part II: Data Processing -- Implicit Factoring with Shared Middle Discrete Bits -- Loading Data into HBase -- Incomplete Decision-Theoretic Rough Sets Model based on Improved Complete Tolerance Relation -- A New Association Rule Mining Algorithm Based on Compression Matrix -- Decoupling Interrupts from the Internet in Markov Models -- Parallel Feature Selection Based on Map Reduce -- Initial State Modeling of Interlocking System Using Maude -- Semi-supervised Learning Using Non-Negative Matrix Factorization and Harmonic Functions -- Exploring Data Communication at System Level through Reverse Engineering: A Case Study on USB Device Driver -- Using Spatial Analysis to Identify Tuberculosis Transmission and Surveillance -- Construction Method of Exception Control Flow Graph for Business Process Execution Language Process -- P300 Detection in Electroencephalographic Signals for Brain Computer Interface Systems: A Neural Networks Approach -- Web Content Extraction Technology -- A New Data Intensive Parallel Processing Framework for Spatial Data -- The Approach of Graphical User Interface Testing Guided by Bayesian Model -- A Model for Reverse Logistics with Collection Sites Based on Heuristic Algorithm -- The Storage of Wind Turbine Mass Data Based on MongoDB -- Improvement of Extraction Method of Correlation Time Delay Based on Connected-element Interferometry -- Modelling and Evaluation of the Performance of Parallel/Distributed File System -- CoCell: A Low Diameter, High Performance Data Center Network Architecture -- Simulation Investigation of Counterwork Between Anti-radiation Missile and Active Decoy System -- Simulation Jamming Technique on Binary Phase Coded Pulse Compression Radar -- Part III: Pattern Recognition -- Personalized Information Service Recommendation System Based on Clustering and Classification -- Palmprint Recognition Based on Subclass Discriminant Analysis -- A Process Quality Monitoring Approach of Automatic Aircraft Component Docking -- Overhead Transmission Lines Sag Measurement Based on Image Processing -- Chinese Domain Ontology Learning Based on Semantic Dependency and Formal Concept Analysis -- Text Classification Algorithm Based on Rough Set -- Robust Fragments Based Tracking with Online Selection of Discriminative Features -- Extraction Method of Gait Feature Based on Human Centroid Trajectory.-An Algorithm for Bayesian Networks Structure Learning Based on Simulated Annealing with Adaptive Selection Operator -- Static Image Segmentation Using Polar Space Transformation Technique -- Image Restoration Via Non-local P-Laplace Regularization -- Analysis and Application of Computer Technology on Architectural Space Lighting Visual Design -- Improving Online Gesture Recognition with WarpingLCSS by Multi-Sensor Fusion -- The Lane Mark Identifying and Tracking in Intense Illumination -- Classification Modeling of Multi-featured Remote Sensing Images Based on Sparse Representation -- A Parallel and Convergent Support Vector Machine Based on MapReduce -- Vehicle Classification Based on Hierarchical Support Vector Machine -- Image Splicing Detection Based on Machine Learning Algorithm -- A Lane Detection Algorithm Based on Hyperbola Model -- Comparisons and Analyses of Image Softproofing under Different Profile Rendering Intents -- An Improved Dense Matching Algorithm for Face Based on Region Growing -- An Improved Feature Selection Method for Chinese Short Texts Clustering Based on HowNet -- Internet Worm Detection and Classification Based on Support Vector Machine -- Real-time Fall Detection Based on Global Orientation and Human Shape -- The Classification of Synthetic Aperture Radar Oil Spill Images Based on the Texture Features and Deep Belief Network -- The Ground Objects Identification for Digital Remote Sensing Image Based on the BP Neural Network -- Detection of Image Forgery Based on Improved PCA-SIFT -- A Thinning Model for Handwriting-like Image Skeleton -- Discrimination of the White Wine Based on Sparse Principal Component Analysis and Support Vector Machine -- Volume II -- Part IV: Cloud Computing -- Design of Mobile Electronic Payment System -- Power-saving Based Radio Resource Scheduling in Long Term Evolution Advanced Network -- Dispatching and Management Model Based on Safe Performance Interface for Improving Cloud Efficiency -- A Proposed Methodology for an E-health Monitoring System Based on a Fault-tolerant Smart Mobile -- Design And Application of Indoor Geographical Information System -- Constructing Cloud Computing Infrastructure Platform of the Digital Library Base on Virtualization Technology -- A New Single Sign-on Solution in Cloud -- A Collaborative Load Control Scheme for Hierarchical Mobile IPv6 Network -- A High-efficient Selective Content Encryption Method Suitable for Satellite Communication System -- Network Design of a Low-power Parking Guidance System -- Strategy of Domain and Cross-domain Access Control Based on Trust in Cloud Computing Environment -- Detecting Unhealthy Cloud System Status -- Scoring System of Simulation Training Platform Based on Expert System -- Analysis of Distributed File Systems on Virtualized Cloud Computing Environment -- A Decision Support System with Dynamic Probability Adjustment for Fault Diagnosis in Critical Systems -- Design and Implementation of an SD Interface to Multiple-target Interface Bridge -- Cloud Storage Management Technology for Small File Based on Two-Dimensional Packing Algorithm -- Advertising Media Selection and Delivery Decision-making Using Influence Diagram -- The Application of Trusted Computing Technology in the Cloud Security -- The Application Level of E-commerce in Enterprises in China -- Toward a Trinity Model of Digital Education Resources Construction and Management -- Geographic Information System in the Cloud Computing Environment -- Part V: Embedded Systems -- Memory Controller Design Based on Quadruple Modular Redundant Architecture -- Computer Power Management System Based On the Face Detection -- Twist Rotation Deformation of Titanium Sheet Metal in Laser Curve Bending Based on Finite Element Analysis -- Voltage Transient Stability Analysis by Changing the Control Modes of the Wind Generator -- The Generator Stator Fault Analysis Based on the Multi-loop Theory -- An Improved Edge Flag Algorithm Suitable for Hardware Implementation -- A Handheld Controller with Embedded Real-time Video Transmission Based on TCP/IP Protocol.-Evaluating the Energy Consumption of InfiniBand Switch Based on Time Series -- Real-time Filtering Method Based on Neuron Filtering Mechanism and its Application on Robot Speed Signals -- Multiple View Spectral Embedded Clustering Using a Co-training Approach -- Feedback the Earliest Deadline First development Asynchronous Dynamic Voltage Scaling Hardware Assisted -- Design and Realization of General Interface Based on Object Linking and Embedding for Process Control -- A Stateful and Stateless IPv4/IPv6 Translator Based on Embedded System -- A Novel Collaborative Filtering Approach by Using Tags and Field Authorities -- Characteristics of Impedance for Plasma Antenna -- A Low Voltage 5.8-GHz Complementary Oxide-mental Semiconductor Transceiver Front-end Chip Design for Dedicated Short-range Communicatio. |
| Record Nr. | UNINA-9910299498403321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Emerging technologies for information systems, computing, and management / / W. Eric Wong and Tinghuai Ma, editors
| Emerging technologies for information systems, computing, and management / / W. Eric Wong and Tinghuai Ma, editors |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | New York, : Springer, 2013 |
| Descrizione fisica | 1 online resource (1295 p.) |
| Disciplina | 004 |
| Altri autori (Persone) |
WongW. Eric
MaTinghuai |
| Collana | Lecture notes in electrical engineering |
| Soggetto topico |
Information technology
Computer software |
| ISBN |
9781461470106
1461470102 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | The Design for High Dynamic GPS Receiver in a Combinated Method of FLL and PLL -- The Modeling of Grid Workflow Service Based on GSCPN -- A Voice Conversion Method Based on the Separation of Speaker-specific Characteristics -- The Application of Information Security on the Computer Terminals of 3rd-generation Nuclear Power Plant -- Comprehensive Feature Index for Meridian Information Based on Principal Component Projection -- The Centralized Maintenance Mode of SAP System Based on Finance Shared Service Center -- An improved Method of Polyphase Filter Banks Channelization -- An Approach for Large Scale Retrieval Using Peer-to-Peer Network Based on Interest Community -- A RouterUpdate Method for Tor Anonymous Communication System -- Management of Construction Schedules Based on Building Information Modeling Technology -- P-Hub Airline Network Design Incorporating Interaction Between Elastic Demand and Network Structure -- Aggregation Operators of Interval Grey Numbers and Their use in Grey Multi-attribute Decision- Making -- The Information Discovery Service of Electronic Product Code Network -- Modeling Goals for Information System by a Heuristic Way -- Environment Monitoring System Based on Internet of Things -- Utility Theory Based Approach for Converged Telecommunications Applications -- Open the Black Box of Information Technology Artifact: Underlying Technological Characteristics Dimension and its Measurement -- Joint Optimization about Pattern Synthesis of Circular Arrays Based on the Niche Genetic Algorithm -- The Application of Wavelet Analysis and BP Neural Network for the Early Diagnosis of Coronary Heart Disease -- Using More Initial Centers for the Seeding-based Semi-supervised K-harmonic Means Clustering -- Analysis and Optimization of CFS Scheduler on NUMA-based Systems -- Web Crawler for Event-Driven Crawling of AJAX-Based Web Applications -- On the Universal Approximation Capability of Flexible Approximate Identity Neural Networks -- A Spectral Clustering Algorithm Based on Particle Swarm Optimization -- A Framework for Porting Linux OS to a cc-NUMA Server Based on Loongson Processors -- Optimization for the Locations of B2C E-Commerce Distribution Network Based on an Improved Genetic Algorithm -- An Improved Multi-Objective Differential Evolution Algorithm with an Adaptive Crossover Rate -- Research on Semantic Based Distributed Service Discovery in P2P Environments/Networks -- Fast String Matching Algorithm Based on the Skip Algorithm -- Burst Signal Sorting Based on the Phase Continuity -- Fast Recapture and Positioning Algorithm Based on PMF-FFT Structure -- An Evaluation Computing Method Based on Cloud Model with Core Space and Its Application: Bridges Management Evaluation -- A Game Theory Based MapReduce Scheduling Algorithm -- Dynamic USBKEY System on Multiple Verification Algorithm -- Anomaly Detection Algorithm Based on Pattern Density in Time Series -- Integrative Optimal Design of Experiments with Multiple Sources -- Fast Image Reconstruction Algorithm for Radio Tomographic Imaging -- Reliability Monitoring Algorithm in Multi-constellation Satellite Navigation -- CTL Model Checking Algorithm Using MapReduce -- LBSG: a Load Balancing Scenario Based on Genetic Algorithm -- Improved Ant Colony Algorithm for the Constrained Vehicle Routing -- Active Queue Management Mechanism Based on DiffServ in MPLS Networks -- The Analysis and Implementation of Universal Workflow with Partition Algorithm on Finite Field -- Optimization for the Logistics Network of Electric Power Enterprise Based on a Mixed MCPSO and Simulated Annealing Algorithm -- Bi-level Programming Model and Taboo Search Algorithm in Industrial Location under the condition of Random Price -- Electrophysiological Correlates of Processing Visual Target Stimuli during a Visual Oddball Paradigm: an Event-related Potential Study -- Realization of Equipment Simulation Training System Based on Virtual Reality Technology -- Super Sparse Projection Reconstruction of Computed Tomography Image Based-on Reweighted Total Variation.-Sea Wave Filter Design for Cable-height Control system of Anti-submarine Helicopter -- Reversible Watermarking Based on Prediction-Error Expansion for 2D Vector Maps -- An Object Tracking Approach Based on Hu Moments and ABCshift -- Motion Blur Identification Using Image Statistics for Coded Exposure Photography -- Medical Images Fusion using Parameterized Logarithmic Image Processing Model and Wavelet Sub-band Selection Schemes -- Insect Extraction Based on the Improved Color Channel Comparison Method -- Combining Steerable Pyramid and Gaussian Mixture Models for Multi-Modal Remote Sensing Image Registration -- Offset Modify in Histogram Testing of Analog-to-digital Converter Based on Sinewave -- Image Text Extraction Based on Morphology and Color Layering -- Face Detection Using Ellipsoid Skin Model -- Emergency Pre-Warning Decision Support System Based on Ontology and Swrl -- Feature Reduction Using Locally Linear Embedding and Distance Metric Learning -- An Autonomous Rock Identification Method for Planetary Exploration -- Recognition of CD4 Cell Images Based on SVM with an Improved Parameter -- A Method of Automatic Regression Test Scope Selection Using Features Digraph -- The Development of the Wireless Vehicle Detector Data Receiving and Processing Host System -- The Feature Extraction of Rolling Bearing Fault Based on Wavelet Packet- empirical mode decomposition and Kurtosis Rule -- Robot Perception Based on Different Computational Intelligence Techniques -- Study on Technique for GPS IF Signal Simulation -- New Method of Image Denoising Based on Fractional Wavelet Transform -- Semantic Representation of Role & Task Based Access Control -- New Immersive Display System Based on Single Projector and Curved Surface Reflector -- Self-Adaptive Cloth Simulation Method Based on Human Ring Data -- Combination Approach of SVM Ensembles and Resampling Method for Imbalanced Datasets -- Join Optimization for Large-scale Data Analysis in MapReduce -- Key Technologies of Data Preparation for Simulation Systems -- Suspend-to-PCM: A New Power-Aware Strategy for Operating System's Rapid Suspend and Resume -- A Web Content Recommendation Method Based on Data Provenance Tracing and Forecasting -- Research and Implementation of Massive Data Atlas Visual Strategy -- The Autonomous System Topology Build Method Based on Multi-Source Data Fusion -- Salinity Time Series Prediction and Forecasting Using Dynamic Neural Networks in the Qiantang River Estuary -- An Adaptive Packet Loss Recovery Method for Peer-to-Peer Video Streaming over Wireless Mesh Network.-Measurement of Deformed Surface and Key Data Processing Based on Reverse Engineering -- Post-Hoc Evaluation Model for Development Workload of Gait Characteristic Database System -- Acquisition Time Performance of Initial Cell Search in 3GPP LTE System -- Multi-Agent System Set for Software Maintainability Design -- Wireless Video Transmission System Based on WIFI -- The Self-adapted Taxi Dispatch Platform Based on Geographic Information System -- Contract-based Combined Component Interaction Graph Generation -- An Improved Weighted Averaging Method for Evidence Fusion -- Optimization for Family Energy Consumption in Real-time Pricing Environment -- The Implementation with the Network Data Security on the Secure Desktop -- The Integration of Temporal Database and Vague Set -- New Regional Investors Discovery by Web Mining -- Enhancing Ability of Fault Detection for Component Systems Based on Object Interactions Graph -- A Method of Deploying Virtual Machine on Multi-Core CPU in Decomposed Way -- An MDA Based Widget Development Framework -- Design of Real-Time Fire Evacuees’ State Information Verification System for Fire Rescue -- Detection and Analysis of Unidirectional Links in Mobile Ad Hoc Network under Nuclear Power Plants Environment -- Real-time Motion Detection in Dynamic Scenes -- Using Kohonen Cluster to Identify Time-of-day Break Points of Intersection -- Botnet Emulation: Challenges and Techniques -- A New System for Summoning and Scheduling Taxis -- A Social Interest Indicator Based Mobility Model for Ad Hoc Network -- Topological Map and Probability Model of the Multiple Plane and Multiple Stage Packet Switching Fabric -- Virtual Reality Enhanced Rehabilitation Training Robot for Early Spinal Cord Injury -- Syntactic Rules of Spatial Relations in Natural Language -- An Improved Plagiarism Detection Method - Model and Sample -- The Application of I/O Virtualization Framework in TaiShan Nuclear Power Plant -- Application of Virtual Reality Techniques for Simulation in Nuclear Power Plant -- SCM-BSIM: A Non-Volatile Memory Simulator Based on BOCHS -- Model of Horizontal Technological Alliance Based on Energy Efficiency -- Evaluating Life-cycle Matrix Model for Mobile Social Network -- Regulation and Environmental Innovation: Effect and Regional Disparities in China -- The Organizational Innovation Path Formation Mechanism of Innovative-oriented Enterprises Based on Effect Elements -- Assessment of S&T Progress’ Share in China Provincial Economy Growth -- Inter-firm Innovation Networks: the Impact of Scale-free Property on Firm Innovation -- Dynamic Analysis on Significant Risk of Innovative Enterprise during the Strategic Transformation Period -- The Development of State-level Science and Technology Industrial Parks in China: Industry Clustering or Enterprises Gathering? -- Evaluation of Person-Job Fit on Knowledge Workers Integrating AHP and BP Neural Network -- Discussion of ITM-based Human Resources Planning and Management: an Example of W Corporation -- Is Inequality or Deficiency the Real Trouble?—The Influencing Factors of the Income Satisfaction of Chinese Sci-tech Personnel -- Understanding College Students’ Knowledge Sharing Willingness in Virtual Academic Community:A Survey Study -- An Application of Entrepreneurship Score Model in Col. |
| Record Nr. | UNINA-9910437771503321 |
| New York, : Springer, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Handbook of software fault localization : foundations and advances / / edited by W. Eric Wong, T. H. Tse
| Handbook of software fault localization : foundations and advances / / edited by W. Eric Wong, T. H. Tse |
| Pubbl/distr/stampa | Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2023] |
| Descrizione fisica | 1 online resource (611 pages) |
| Disciplina | 005.1 |
| Soggetto topico |
Software failures
Software failures - Data processing Debugging in computer science Computer software - Quality control |
| ISBN |
1-119-88092-0
1-119-29181-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover -- Title Page -- Copyright Page -- Contents -- Editor Biographies -- List of Contributors -- Chapter 1 Software Fault Localization: an Overview of Research, Techniques, and Tools -- 1.1 Introduction -- 1.2 Traditional Fault Localization Techniques -- 1.2.1 Program Logging -- 1.2.2 Assertions -- 1.2.3 Breakpoints -- 1.2.4 Profiling -- 1.3 Advanced Fault Localization Techniques -- 1.3.1 Slicing-Based Techniques -- 1.3.2 Program Spectrum-Based Techniques -- 1.3.2.1 Notation -- 1.4 Subject Programs -- 1.5 Evaluation Metrics -- 1.6 Software Fault Localization Tools -- 1.7 Critical Aspects -- 1.7.1 Fault Localization with Multiple Bugs -- 1.7.2 Inputs, Outputs, and Impact of Test Cases -- 1.7.3 Coincidental Correctness -- 1.7.4 Faults Introduced by Missing Code -- 1.7.5 Combination of Multiple Fault Localization Techniques -- 1.7.6 Ties Within Fault Localization Rankings -- 1.7.7 Fault Localization for Concurrency Bugs -- 1.7.8 Spreadsheet Fault Localization -- 1.7.9 Theoretical Studies -- 1.8 Conclusion -- 1.8 Notes -- References -- Chapter 2 Traditional Techniques for Software Fault Localization -- 2.1 Program Logging -- 2.2 Assertions -- 2.3 Breakpoints -- 2.4 Profiling -- 2.5 Discussion -- 2.6 Conclusion -- References -- Chapter 3 Slicing-Based Techniques for Software Fault Localization -- 3.1 Introduction -- 3.2 Static Slicing-Based Fault Localization -- 3.2.1 Introduction -- 3.2.2 Program Slicing Combined with Equivalence Analysis -- 3.2.3 Further Application -- 3.3 Dynamic Slicing-Based Fault Localization -- 3.3.1 Dynamic Slicing and Backtracking Techniques -- 3.3.2 Dynamic Slicing and Model-Based Techniques -- 3.3.3 Critical Slicing -- 3.3.3.1 Relationships Between Critical Slices (CS) and Exact Dynamic Program Slices (DPS) -- 3.3.3.2 Relationship Between Critical Slices and Executed Static Program Slices -- 3.3.3.3 Construction Cost.
3.3.4 Multiple-Points Dynamic Slicing -- 3.3.4.1 BwS of an Erroneous Computed Value -- 3.3.4.2 FwS of Failure-Inducing Input Difference -- 3.3.4.3 BiS of a Critical Predicate -- 3.3.4.4 MPSs: Dynamic Chops -- 3.3.5 Execution Indexing -- 3.3.5.1 Concepts -- 3.3.5.2 Structural Indexing -- 3.3.6 Dual Slicing to Locate Concurrency Bugs -- 3.3.6.1 Trace Comparison -- 3.3.6.2 Dual Slicing -- 3.3.7 Comparative Causality: a Causal Inference Model Based on Dual Slicing -- 3.3.7.1 Property One: Relevance -- 3.3.7.2 Property Two: Sufficiency -- 3.3.8 Implicit Dependences to Locate Execution Omission Errors -- 3.3.9 Other Dynamic Slicing-Based Techniques -- 3.4 Execution Slicing-Based Fault Localization -- 3.4.1 Fault Localization Using Execution Dice -- 3.4.2 A Family of Fault Localization Heuristics Based on Execution Slicing -- 3.4.2.1 Heuristic I -- 3.4.2.2 Heuristic II -- 3.4.2.3 Heuristic III -- 3.4.3 Effective Fault Localization Based on Execution Slices and Inter-block Data Dependence -- 3.4.3.1 Augmenting a Bad D(1) -- 3.4.3.2 Refining a Good D(1) -- 3.4.3.3 An Incremental Debugging Strategy -- 3.4.4 Other Execution Slicing-Based Techniques in Software Fault Localization -- 3.5 Discussions -- 3.6 Conclusion -- 3.6 Notes -- References -- Chapter 4 Spectrum-Based Techniques for Software Fault Localization -- 4.1 Introduction -- 4.2 Background and Notation -- 4.2.1 Similarity Coefficient-Based Fault Localization -- 4.2.2 An Example of Using Similarity Coefficient to Compute Suspiciousness -- 4.3 Insights of Some Spectra-Based Metrics -- 4.4 Equivalence Metrics -- 4.4.1 Applicability of the Equivalence Relation to Other Fault Localization Techniques -- 4.4.2 Applicability Beyond Fault Localization -- 4.5 Selecting a Good Suspiciousness Function (Metric) -- 4.5.1 Cost of Using a Metric -- 4.5.2 Optimality for Programs with a Single Bug. 4.5.3 Optimality for Programs with Deterministic Bugs -- 4.6 Using Spectrum-Based Metrics for Fault Localization -- 4.6.1 Spectrum-Based Metrics for Fault Localization -- 4.6.2 Refinement of Spectra-Based Metrics -- 4.7 Empirical Evaluation Studies of SBFL Metrics -- 4.7.1 The Construction of D* -- 4.7.2 An Illustrative Example -- 4.7.3 A Case Study Using D* -- 4.7.3.1 Subject Programs -- 4.7.3.2 Fault Localization Techniques Used in Comparisons -- 4.7.3.3 Evaluation Metrics and Criteria -- 4.7.3.3.1 The EXAM Score -- 4.7.3.3.2 Cumulative Number of Statements Examined -- 4.7.3.3.3 Wilcoxon Signed-Rank Test -- 4.7.3.4 Statement with Same Suspiciousness Values -- 4.7.3.5 Results -- 4.7.3.6 Effectiveness of D* with Different Values of * -- 4.7.3.7 D* Versus Other Fault Localization Techniques -- 4.7.3.8 Programs with Multiple Bugs -- 4.7.3.8.1 The Expense Score-Based Approach -- 4.7.3.8.2 The One-Bug-at-a-Time Approach -- 4.7.3.9 Discussion -- 4.7.3.9.1 Intuition -- 4.7.3.9.2 Best and Worst Effectiveness Versus Other Alternatives -- 4.7.3.9.3 Threats to Validity -- 4.8 Conclusion -- 4.8 Notes -- References -- Chapter 5 Statistics-Based Techniques for Software Fault Localization -- 5.1 Introduction -- 5.1.1 Tarantula -- 5.1.2 How It Works -- 5.2 Working with Statements -- 5.2.1 Techniques Under the Same Problem Settings -- 5.2.2 Statistical Variances -- 5.3 Working with Non-statements -- 5.3.1 Predicate: a Popular Trend -- 5.3.2 BPEL: a Sample Application -- 5.4 Purifying the Input -- 5.4.1 Coincidental Correctness Issue -- 5.4.2 Class Balance Consideration -- 5.5 Reinterpreting the Output -- 5.5.1 Revealing Fault Number -- 5.5.2 Noise Reduction -- 5.5.2 Notes -- References -- Chapter 6 Machine Learning-Based Techniques for Software Fault Localization -- 6.1 Introduction -- 6.2 BP Neural Network-Based Fault Localization. 6.2.1 Fault Localization with a BP Neural Network -- 6.2.2 Reduce the Number of Candidate Suspicious Statements -- 6.3 RBF Neural Network-Based Fault Localization -- 6.3.1 RBF Neural Networks -- 6.3.2 Methodology -- 6.3.2.1 Fault Localization Using an RBF Neural Network -- 6.3.2.2 Training of the RBF Neural Network -- 6.3.2.3 Definition of a Weighted Bit-Comparison-Based Dissimilarity -- 6.4 C4.5 Decision Tree-Based Fault Localization -- 6.4.1 Category-Partition for Rule Induction -- 6.4.2 Rule Induction Algorithms -- 6.4.3 Statement Ranking Strategies -- 6.4.3.1 Revisiting Tarantula -- 6.4.3.2 Ranking Statements Based on C4.5 Rules -- 6.4.3.2.1 Heuristic -- 6.4.3.2.2 Computing a Statement Ranking -- 6.4.3.2.3 Rule Selection -- 6.5 Applying Simulated Annealing with Statement Pruning for an SBFL Formula -- 6.6 Conclusion -- 6.6 Notes -- References -- Chapter 7 Data Mining-Based Techniques for Software Fault Localization -- 7.1 Introduction -- 7.2 Formal Concept Analysis and Association Rules -- 7.2.1 Formal Concept Analysis -- 7.2.2 Association Rules -- 7.3 Data Mining for Fault Localization -- 7.3.1 Failure Rules -- 7.3.2 Failure Lattice -- 7.4 The Failure Lattice for Multiple Faults -- 7.4.1 Dependencies Between Faults -- 7.4.2 Example -- 7.5 Discussion -- 7.5.1 The Structure of the Execution Traces -- 7.5.2 Union Model -- 7.5.3 Inter section Model -- 7.5.4 Nearest Neighbor -- 7.5.5 Delta Debugging -- 7.5.6 From the Trace Context to the Failure Context -- 7.5.7 The Structure of Association Rules -- 7.5.8 Multiple Faults -- 7.6 Fault Localization Using N-gram Analysis -- 7.6.1 Background -- 7.6.1.1 Execution Sequence -- 7.6.1.2 N-gram. Analysis -- 7.6.1.3 Linear Execution Blocks -- 7.6.1.4 Association Rule Mining -- 7.6.2 Methodology -- 7.6.3 Conclusion -- 7.7 Fault Localization for GUI Software Using N-gram Analysis -- 7.7.1 Background. 7.7.1.1 Representation of the GUI and Its Operations -- 7.7.1.2 Event Handler -- 7.7.1.3 N-gram -- 7.7.2 Association Rule Mining -- 7.7.3 Methodology -- 7.7.3.1 General Approach -- 7.7.3.2 N-gram Fault Localization Algorithm -- 7.8 Conclusion -- 7.8 Notes -- References -- Chapter 8 Information Retrieval-Based Techniques for Software Fault Localization -- 8.1 Introduction -- 8.2 General IR-Based Fault Localization Process -- 8.3 Fundamental Information Retrieval Techniques for Software Fault Localization -- 8.3.1 Vector Space Model -- 8.3.2 Topic Modeling -- 8.3.3 Word Embedding -- 8.4 Evaluation Metrics -- 8.4.1 Top-k Prediction Accuracy -- 8.4.2 Mean Reciprocal Rank (MRR) -- 8.4.3 Mean Average Precision (MAP) -- 8.5 Techniques for Different Scenarios -- 8.5.1 Text of Current Bug Report Only -- 8.5.1.1 VSM Variants -- 8.5.1.2 Topic Modeling -- 8.5.2 Text and History -- 8.5.2.1 VSM Variants -- 8.5.2.2 Topic Modeling -- 8.5.2.3 Deep Learning -- 8.5.3 Text and Stack/Execution Traces -- 8.6 Empirical Studies -- 8.7 Miscellaneous -- 8.8 Conclusion -- 8.8 Notes -- References -- Chapter 9 Model-Based Techniques for Software Fault Localization -- 9.1 Introduction -- 9.2 Basic Definitions and Algorithms -- 9.2.1 Algorithms for MBD -- 9.3 Modeling for MBD -- 9.3.1 The Value-Based Model -- 9.3.2 The Dependency-Based Model -- 9.3.3 Approximation Models for Debugging -- 9.3.4 Other Modeling Approaches -- 9.4 Application Areas -- 9.5 Hybrid Approaches -- 9.6 Conclusion -- 9.6 Notes -- References -- Chapter 10 Software Fault Localization in Spreadsheets -- 10.1 Motivation -- 10.2 Definition of the Spreadsheet Language -- 10.3 Cones -- 10.4 Spectrum-Based Fault Localization -- 10.5 Model-Based Spreadsheet Debugging -- 10.6 Repair Approaches -- 10.7 Checking Approaches -- 10.8 Testing -- 10.9 Conclusion -- 10.9 Notes -- References. Chapter 11 Theoretical Aspects of Software Fault Localization. |
| Record Nr. | UNINA-9910830449103321 |
| Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2023] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Proceedings of the 2011 ACM Symposium on Applied Computing
| Proceedings of the 2011 ACM Symposium on Applied Computing |
| Autore | Chu William |
| Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2011 |
| Descrizione fisica | 1 online resource (1868 pages) |
| Collana | ACM Conferences |
| Soggetto topico |
Engineering & Applied Sciences
Computer Science |
| ISBN | 1-4503-0113-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
Proceedings of the 2011 Association for Computing Machinery Symposium on Applied Computing
SAC'11 the 2011 ACM Symposium on Applied Computing, TaiChung, Taiwan - March 21 - 24, 2011 |
| Record Nr. | UNINA-9910376519103321 |
Chu William
|
||
| [Place of publication not identified], : ACM, 2011 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Proceedings of the 3rd International Workshop on Automation of Software Test
| Proceedings of the 3rd International Workshop on Automation of Software Test |
| Autore | Zhu Hong |
| Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2008 |
| Descrizione fisica | 1 online resource (94 pages) |
| Collana | ACM Conferences |
| Soggetto topico |
Engineering & Applied Sciences
Computer Science |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | AST '08 |
| Record Nr. | UNINA-9910376405703321 |
Zhu Hong
|
||
| [Place of publication not identified], : ACM, 2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Proceedings of the 4th International Conference on Computer Engineering and Networks : CENet2014 / / edited by W. Eric Wong
| Proceedings of the 4th International Conference on Computer Engineering and Networks : CENet2014 / / edited by W. Eric Wong |
| Edizione | [1st ed. 2015.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
| Descrizione fisica | 1 online resource (1252 p.) |
| Disciplina |
004.6
621.39 |
| Collana | Lecture Notes in Electrical Engineering |
| Soggetto topico |
Electrical engineering
Computer networks Communications Engineering, Networks Computer Communication Networks |
| ISBN | 3-319-11104-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | A Spatio-temporal Cluster Method for Trajectory Data -- Use Case Points Method of Software Size Measurement Based on Fuzzy Interference -- The ATPG Algorithm for Crosstalk Delay Faults of the High-speed Interconnection Circuits -- Application of Fuzzy-PID Control in Synchronization Control of Multi-Stepping Motor -- The Improved Bayesian Algorithm to Spam Filtering -- Evolution of Community Structure in Complex Networks -- The Thermal Power Enterprise Environmental Performance Evaluation Model Construct -- A Mobile Localization Algorithm Based on SPSO Algorithm -- A Fast and Accurate Algorithm of Subspace Spectrum Peak Search Based on Bisection Method -- A CRF-based Method for DDoS Attacks Detection -- Advanced SOM Algorithm Based on Extension Distance and Its Application -- A Trilateral Centroid Localization and Modification Algorithm for Wireless Sensor Network -- Simulation Study on Trajectory Tracking in Manipulator Based on the Iterative Learning Control Algorithm -- An Improved Gaussian Mixture Model and Its Application -- GPU Acceleration for the Gaussian Elimination in Magnetotelluric Occam Inversion Algorithm -- Artificial Neural Networks in Biomedicine Applications -- SOC Prediction Method of a New Lithium Battery Based on GA-BP Neural Network -- Compressive Sensing for Channel State Information (CSI) Feedback in MIMO Broadcast Channels -- Implementation and Performance Evaluation of the Fully-Enclosed-Region Upper Confidence Bound Applied to Trees Algorithm -- A New Linear Feature Item Weighting Algorithm -- Trust Value of the Role Access Control Model Based on Trust -- Universal Approximation by Generalized Mellin Approximate Identity Neural Networks -- Research and Application of Function Optimization Based on Artificial Fish Swarm Algorithm -- Robust Hand Tracker Using Joint Temporal Weighted Feature -- Combination of User's Judging Power and Similarity for Collaborative Recommendation Algorithm -- An Improved Naive Bayes Classifier Method in Public Opinion Analysis -- Oversea Risk Intelligence Monitoring Based on Computer Model -- Quality of Service Based Particle Swarm Optimization Scheduling in Cloud Computing -- Data Processing -- The Improvement of Database Retrieval Efficiency -- Improvement of TCP Performance in Satcom Links by Packet-loss Detection -- Key Management Scheme in Cluster for WSNs -- An Energy-Saving Method for Erasure-Coded Distributed Storage System -- LF: A Caching Strategy for Named Data Mobile Ad-hoc NETworks (MANET) -- Topological Characteristics of Class Collaborations -- Cluster Key Scheme Based on Bilinear Pairing for Wireless Sensor Networks -- The LDP Protocol Formal Description and Verification Based on CPN Model -- Self-adaptive Anomaly Detection Method for Hydropower Unit Vibration (RBF) Neural Network -- A Fast Distribution-based Clustering Algorithm for Massive Data -- The Design and Implementation of Virtual Experiment System Based on Universal Design -- Influences of Information Service to Economic Growth in Jilin Province -- Day-ahead Electricity Demand Forecasting with using Ahybrid Method -- Membrane System for the Decision-making Problem -- The Operational Model Management C/S System Based on RUP -- Decision Analysis Method Based on Improved Bayesian Rough Set and Evidence Theory under Incomplete Decision System -- An Enhanced Entropy-K Nearest Neighbor Algorithm Based on Attribute Reduction -- Synthetic Safety Analysis: A Systematic Approach in Combination of Fault Tree Analysis and Fuzzy Failure Modes and Effect Analysis -- Evaluation Model of Internet Service Provider Attraction Based on Gravity Model -- An Application of Ecological Adaptation Evaluation of Orthoptera in Daqinggou Nature Reserve Using SPSS -- Intelligent Diagnostics Applied Technology of Specialized Vehicle Based on Knowledge Reasoning -- On the Evaluation of Influence of Golf Website in China -- An Ensemble Learning Approach for Improving Drug-Target Interactions Prediction -- A Complementary Predictor for Collaborative Filtering -- Knowledge Discovery from Knowledge Bases with Higher-Order Logic -- Numerical Analysis on High-Altitude Air-Drop Impact Processing of Water Bag -- Heterogeneous Data Sources Synchronization Based on Man-in-the-Middle Attack -- Direct Forecast Method Based on ANN in Network Traffic Prediction -- Pattern Recognition -- Visual Simulation of Three Point Method Guidance Trajectory for Anti-tank Missile -- A Fast and Accurate Pupil Localization Method Using Gray Gradient Differential and CurveFitting -- A Method for the Chinese-Tibetan Machine Translation System's Syntactic Analysis -- Analysis of Micro-Doppler Features of Armored Vehicle Based on EMD -- Kinect Based 3D Color Reconstruction -- Application of Image Retrieval Based on the Improved Local Binary Pattern -- Intelligent Detection of Complex Gap in Live Working Based on Video -- Face Detection Based on Landmark Localization -- Implement Image Enhancement Using Fractional Order Differential -- An Improved Fractional Differential Method for Image Enhancement -- On Qualitative Analysis of High-Contrast Patches in Range Images -- An Improved Tracking and Counting Method of the Moving Object Using Graph Cuts -- Automatic Detection of Pharyngeal Fricatives in Cleft Palate Speech -- An Improved Chinese Word Segmentation Disambiguation Model Based on Conditional Random Fields -- Mobile Real-time Monitoring System Basd On Human Action Recognition -- A Kind of Image Classification Method Study -- Weld Pool Image Processing and Feature Extraction Based on the Vision of the CO2 Welding -- On Energy Distribution Characteristics of Froth Images -- Classification Performances of Extreme Learning Machine with Choquet Integral -- Facial Expression Recognition Using Color-Depth Cameras -- Parallel Pipeline Implementation for Moving Objects Detection in Traffic Video Analysis on a Heterogeneous Platform -- A Novel Optical Flow Algorithm Based on Bionic Features for Robust Tracing -- An Obstacle Detection System in Mobile Robot Based on Radar-vision Fusion -- De-noising Method for Echocardiographic Images Based on the Second Generation Curvelet Transform -- A Novel Method for Image Segmentation Using Pulse Coupled Neural Network Based on Root Mean Square of Grayscale -- Combinded Similarity Based Spectral Clustering Ensemble for PolSAR Land Cover Classification -- An Algorithm for Human Face Detection in Color Image Based on Skin Color Segmentation -- A Social Network Service-based Environment Monitoring System in Home. |
| Record Nr. | UNINA-9910299848503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||