top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Adaptive control approach for software quality improvement [[electronic resource] /] / editors, W. Eric Wong, Bojan Cukic
Adaptive control approach for software quality improvement [[electronic resource] /] / editors, W. Eric Wong, Bojan Cukic
Pubbl/distr/stampa New Jersey, : World Scientific, 2011
Descrizione fisica 1 online resource (308 p.)
Disciplina 005.14
Altri autori (Persone) WongW. Eric
CukicBojan
Collana Series on software engineering and knowledge engineering
Soggetto topico Software engineering
Computer software - Development
Soggetto genere / forma Electronic books.
ISBN 1-283-43372-9
9786613433725
981-4340-92-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface; CONTENTS; 1. Prioritizing Coverage-Oriented Testing Process - An Adaptive-Learning-Based Approach and Case Study Fevzi Belli, Mubariz Eminov, Nida G ok ce and W. Eric Wong; 1. Introduction and Related Work; 2. Background; 2.1. Event Sequence Graphs; 2.2. Neural Network-Based Clustering; 3. Competitive Learning; 3.1. Distance-Based Competitive Learning Algorithm; 3.2. Angle-Based Competitive Learning Algorithm; 3.3. Adaptive Competitive Learning; Adaptive Competitive Learning Algorithm; 4. Prioritized ESG-Based Testing; 4.1. Definition of the Attributes of Events
4.2. Definition of Importance Degree and PreferenceIndirect Determination of the Preference Degree; 5. A Case Study; 5.1. Derivation of the Test Cases; 5.2. Determination of Attributes of Events; 5.3. Construction of the Groups of Events; 5.4. Indirect Determination of Preference Degrees; 6. Conclusions and Future Work; References; 2. Statistical Evaluation Methods for V&V of Neuro-Adaptive Systems Y. Liu, J. Schumann and B. Cukic; 1. Introduction; 2. V&V of Neuro-Adaptive Systems; 2.1. Static V&V Approaches; 2.2. Dynamic V&V Approaches; 2.3. V&V of Neural Networks
3. Statistical Evaluation of Neuro-Adaptive Systems3.1. Neural Network-Based Flight Control; 3.2. The Neural Networks; 3.2.1. Dynamic Cell Structure Network; 3.2.2. Sigma-Pi Neural Network; 3.3. Failure Detection Using Support Vector Data Description; 3.4. Evaluating Network's Learning Performance; 3.4.1. A Sensitivity Metric for DCS Networks; 3.4.2. A Sensitivity Metric for Sigma-Pi Networks; 3.5. Evaluating the Network's Output Quality; 3.5.1. Validity Index for DCS Networks; 3.5.2. Bayesian Confidence Tool for Sigma-Pi Networks; 4. Conclusions; References
3. Adaptive Random Testing Dave Towey1. Introduction; 2. Adaptive Random Testing; 2.1. Distance-Based Adaptive Random Testing; 2.2. Restriction-Based Adaptive Random Testing; 2.3. Overheads; 2.4. Filtering; 2.5. Forgetting; 2.6. Mirror ART; 2.7. Probabilistic ART; 2.8. Fuzzy ART; 3. Summary; Acknowledgements; References; 4. Transparent Shaping: A Methodology for Adding Adaptive Behavior to Existing Software Systems and Applications S. Masoud Sadjadi, Philip K. Mckinley and Betty H.C. Cheng; 1. Introduction; 2. Basic Elements; 3. General Approach; 4. Middleware-Based Transparent Shaping
4.1. ACT Architectural Overview4.2. ACT Core Components; Dynamic Interceptors; Proxies; Decision Makers; 4.3. ACT Operation; 4.4. ACT/J Implementation; 4.5. ACT/J Case Study; 5. Language-Based Transparent Shaping; 5.1. TRAP/J Architectural Overview; 5.2. TRAP/J Run-Time Model; 5.3. TRAP/J Case Study; Making ASA Adapt-Ready; Compile-Time Actions; Generated Aspect; Generated Wrapper-Level Class; Generated Metalevel Class; Adapting to Loss Rate; Balancing QoS and Energy Consumption; 6. Discussion; 7. Conclusions and Future Work; Acknowledgements; References
5. Rule Extraction to Understand Changes in an Adaptive System Marjorie A. Darrah and Brian J. Taylor
Record Nr. UNINA-9910457436603321
New Jersey, : World Scientific, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Adaptive control approach for software quality improvement [[electronic resource] /] / editors, W. Eric Wong, Bojan Cukic
Adaptive control approach for software quality improvement [[electronic resource] /] / editors, W. Eric Wong, Bojan Cukic
Pubbl/distr/stampa New Jersey, : World Scientific, 2011
Descrizione fisica 1 online resource (308 p.)
Disciplina 005.14
Altri autori (Persone) WongW. Eric
CukicBojan
Collana Series on software engineering and knowledge engineering
Soggetto topico Software engineering
Computer software - Development
ISBN 1-283-43372-9
9786613433725
981-4340-92-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface; CONTENTS; 1. Prioritizing Coverage-Oriented Testing Process - An Adaptive-Learning-Based Approach and Case Study Fevzi Belli, Mubariz Eminov, Nida G ok ce and W. Eric Wong; 1. Introduction and Related Work; 2. Background; 2.1. Event Sequence Graphs; 2.2. Neural Network-Based Clustering; 3. Competitive Learning; 3.1. Distance-Based Competitive Learning Algorithm; 3.2. Angle-Based Competitive Learning Algorithm; 3.3. Adaptive Competitive Learning; Adaptive Competitive Learning Algorithm; 4. Prioritized ESG-Based Testing; 4.1. Definition of the Attributes of Events
4.2. Definition of Importance Degree and PreferenceIndirect Determination of the Preference Degree; 5. A Case Study; 5.1. Derivation of the Test Cases; 5.2. Determination of Attributes of Events; 5.3. Construction of the Groups of Events; 5.4. Indirect Determination of Preference Degrees; 6. Conclusions and Future Work; References; 2. Statistical Evaluation Methods for V&V of Neuro-Adaptive Systems Y. Liu, J. Schumann and B. Cukic; 1. Introduction; 2. V&V of Neuro-Adaptive Systems; 2.1. Static V&V Approaches; 2.2. Dynamic V&V Approaches; 2.3. V&V of Neural Networks
3. Statistical Evaluation of Neuro-Adaptive Systems3.1. Neural Network-Based Flight Control; 3.2. The Neural Networks; 3.2.1. Dynamic Cell Structure Network; 3.2.2. Sigma-Pi Neural Network; 3.3. Failure Detection Using Support Vector Data Description; 3.4. Evaluating Network's Learning Performance; 3.4.1. A Sensitivity Metric for DCS Networks; 3.4.2. A Sensitivity Metric for Sigma-Pi Networks; 3.5. Evaluating the Network's Output Quality; 3.5.1. Validity Index for DCS Networks; 3.5.2. Bayesian Confidence Tool for Sigma-Pi Networks; 4. Conclusions; References
3. Adaptive Random Testing Dave Towey1. Introduction; 2. Adaptive Random Testing; 2.1. Distance-Based Adaptive Random Testing; 2.2. Restriction-Based Adaptive Random Testing; 2.3. Overheads; 2.4. Filtering; 2.5. Forgetting; 2.6. Mirror ART; 2.7. Probabilistic ART; 2.8. Fuzzy ART; 3. Summary; Acknowledgements; References; 4. Transparent Shaping: A Methodology for Adding Adaptive Behavior to Existing Software Systems and Applications S. Masoud Sadjadi, Philip K. Mckinley and Betty H.C. Cheng; 1. Introduction; 2. Basic Elements; 3. General Approach; 4. Middleware-Based Transparent Shaping
4.1. ACT Architectural Overview4.2. ACT Core Components; Dynamic Interceptors; Proxies; Decision Makers; 4.3. ACT Operation; 4.4. ACT/J Implementation; 4.5. ACT/J Case Study; 5. Language-Based Transparent Shaping; 5.1. TRAP/J Architectural Overview; 5.2. TRAP/J Run-Time Model; 5.3. TRAP/J Case Study; Making ASA Adapt-Ready; Compile-Time Actions; Generated Aspect; Generated Wrapper-Level Class; Generated Metalevel Class; Adapting to Loss Rate; Balancing QoS and Energy Consumption; 6. Discussion; 7. Conclusions and Future Work; Acknowledgements; References
5. Rule Extraction to Understand Changes in an Adaptive System Marjorie A. Darrah and Brian J. Taylor
Record Nr. UNINA-9910778809003321
New Jersey, : World Scientific, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Engineering and Networking : Proceedings of the 2013 International Conference on Computer Engineering and Network (CENet2013) / / edited by W. Eric Wong, Tingshao Zhu
Computer Engineering and Networking : Proceedings of the 2013 International Conference on Computer Engineering and Network (CENet2013) / / edited by W. Eric Wong, Tingshao Zhu
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (1356 p.)
Disciplina 621.382
Collana Lecture Notes in Electrical Engineering
Soggetto topico Electrical engineering
Computer organization
Computers
Communications Engineering, Networks
Computer Systems Organization and Communication Networks
Information Systems and Communication Service
ISBN 9783319017662
3319017667
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Volume I -- Part I: Algorithm Design -- Simulation Algorithm of Adaptive Scheduling in missile-borne Phased Array Radar --  A Second-order Algorithm for Curve Parallel Projection on Parametric Surfaces.-Computation Method of Processing Time based on BP Neural Network and Genetic Algorithm -- Integral Sliding Mode Controller for an Uncertain Network Control System with Delay -- Synthesis of Linear Antenna Array using Genetic Algorithm to Control Side Lobe Level -- Wavelet Analysis Combined with Artificial Neural Network for Predicting Protein-protein Interactions -- Application Analysis of Slot Allocation Algorithm for Link16 -- An Improved Cluster Head Algorithm for Wireless Sensor Network -- An Ant Colony System for Dynamic Voltage Scaling Problem in Heterogeneous System -- An Improved Ant Colony System for Task Scheduling Problem in Heterogeneous Distributed System -- Optimization of Green Agri-food Supply Chain Network Using Particle Swarm Optimization Algorithm -- A New Model for Short-term Power System Load Forecasting using Wavelet Transform Fuzzy RBF Neural Network -- Energy Effective Frequency Based Adaptive Sampling Algorithm for Clustered Wireless Sensor Network -- An Indoor Three-dimensional Positioning Algorithm Based on Difference Received Signal Strength in WiFi -- The Universal Approximation Capability of Double Flexible Approximate Identity Neural Networks -- A Novel  and Realtime Hand Tracking Algorithm for Gesture Manipulation -- A Transforming Quantum-inspired Genetic Algorithm for Optimization of Green Agricultural Products Supply Chain Network -- A Shortest Path Algorithm Suitable for Navigation Software -- An Energy-Balanced Clustering Routing Algorithm for Wireless Sensor Networks -- Simulation and Analysis of Binary Frequency Shift Keying Noise Cancel Adaptive Filter Based on Least Mean Square Error Algorithm -- Density-Sensitive Semi-Supervised Affinity Propagation Clustering -- The Implementation of A Hybrid Particle Swarm Optimization Algorithm Based on Three-level Parallel Model -- Optimization of Inverse Planning Based on an Improved Non-dominated Neighbor-based Selection in Intensity Modulated Radiation Therapy -- A Recommendation System for Paper Submission Based on Vertical Search Engine -- Analysis and Improvement of SPRINT Algorithm Based on Hadoop -- Prediction Model for Trend of Web Sentiment Using Extension Neural Network and Nonparametric Auto-regression Method -- K-optimal Chaos Ant Colony Algorithm and Its Application on Dynamic Route Guidance System -- A Certainty-based Active Learning Framework of Meeting Speech Summarization -- Application of Improved BP Neural Network in the Frequency Identification of Piano Tone -- Part II: Data Processing -- Implicit Factoring with Shared Middle Discrete Bits -- Loading Data into HBase -- Incomplete Decision-Theoretic Rough Sets Model based on Improved Complete Tolerance Relation -- A New Association Rule Mining Algorithm Based on Compression Matrix -- Decoupling Interrupts from the Internet in Markov Models -- Parallel Feature Selection Based on Map Reduce -- Initial State Modeling of Interlocking System Using Maude -- Semi-supervised Learning Using Non-Negative Matrix Factorization and Harmonic Functions -- Exploring Data Communication at System Level through Reverse Engineering: A Case Study on USB Device Driver -- Using Spatial Analysis to Identify Tuberculosis Transmission and Surveillance -- Construction Method of Exception Control Flow Graph for Business Process Execution Language Process -- P300 Detection in Electroencephalographic Signals for Brain Computer Interface Systems: A Neural Networks Approach -- Web Content Extraction Technology -- A New Data Intensive Parallel Processing Framework for Spatial Data -- The Approach of Graphical User Interface Testing Guided by Bayesian Model -- A Model for Reverse Logistics with Collection Sites Based on Heuristic Algorithm -- The Storage of Wind Turbine Mass Data Based on MongoDB -- Improvement of Extraction Method of Correlation Time Delay Based on Connected-element Interferometry -- Modelling and Evaluation of the Performance of Parallel/Distributed File System -- CoCell: A Low Diameter, High Performance Data Center Network Architecture -- Simulation Investigation of Counterwork Between Anti-radiation Missile and Active Decoy System -- Simulation Jamming Technique on Binary Phase Coded Pulse Compression Radar -- Part III: Pattern Recognition -- Personalized Information Service Recommendation System Based on Clustering and Classification -- Palmprint Recognition Based on Subclass Discriminant Analysis -- A Process Quality Monitoring Approach of Automatic Aircraft Component Docking -- Overhead Transmission Lines Sag Measurement Based on Image Processing -- Chinese Domain Ontology Learning Based on Semantic Dependency and Formal Concept Analysis -- Text Classification Algorithm Based on Rough Set -- Robust Fragments Based Tracking with Online Selection of Discriminative Features -- Extraction Method of Gait Feature Based on Human Centroid Trajectory.-An Algorithm for Bayesian Networks Structure Learning Based on Simulated Annealing with Adaptive Selection Operator -- Static Image Segmentation Using Polar Space Transformation Technique -- Image Restoration Via Non-local P-Laplace Regularization -- Analysis and Application of Computer Technology on Architectural Space Lighting Visual Design -- Improving Online Gesture Recognition with WarpingLCSS by Multi-Sensor Fusion -- The Lane Mark Identifying and Tracking in Intense Illumination -- Classification Modeling of Multi-featured Remote Sensing Images Based on Sparse Representation -- A Parallel and Convergent Support Vector Machine Based on MapReduce -- Vehicle Classification Based on Hierarchical Support Vector Machine -- Image Splicing Detection Based on Machine Learning Algorithm -- A Lane Detection Algorithm Based on Hyperbola Model -- Comparisons and Analyses of Image Softproofing under Different Profile Rendering Intents -- An Improved Dense Matching Algorithm for Face Based on Region Growing -- An Improved Feature Selection Method for Chinese Short Texts Clustering Based on HowNet -- Internet Worm Detection and Classification Based on Support Vector Machine -- Real-time Fall Detection Based on Global Orientation and Human Shape -- The Classification of Synthetic Aperture Radar Oil Spill Images Based on the Texture Features and Deep Belief Network -- The Ground Objects Identification for Digital Remote Sensing Image Based on the BP Neural Network -- Detection of Image Forgery Based on Improved PCA-SIFT -- A Thinning Model for Handwriting-like Image Skeleton -- Discrimination of the White Wine Based on Sparse Principal Component Analysis and Support Vector Machine -- Volume II -- Part IV: Cloud Computing -- Design of Mobile Electronic Payment System -- Power-saving Based Radio Resource Scheduling in Long Term Evolution Advanced Network -- Dispatching and Management Model Based on Safe Performance Interface for Improving Cloud Efficiency -- A Proposed Methodology for an E-health Monitoring System Based on a Fault-tolerant Smart Mobile -- Design And Application of Indoor Geographical Information System -- Constructing Cloud Computing Infrastructure Platform of the Digital Library Base on Virtualization Technology -- A New Single Sign-on Solution in Cloud -- A Collaborative Load Control Scheme for Hierarchical Mobile IPv6 Network -- A High-efficient Selective Content Encryption Method Suitable for Satellite Communication System -- Network Design of a Low-power Parking Guidance System -- Strategy of Domain and Cross-domain Access Control Based on Trust in Cloud Computing Environment -- Detecting Unhealthy Cloud System Status -- Scoring System of Simulation Training Platform Based on Expert System -- Analysis of Distributed File Systems on Virtualized Cloud Computing Environment -- A Decision Support System with Dynamic Probability Adjustment for Fault Diagnosis in Critical Systems -- Design and Implementation of an SD Interface to Multiple-target Interface Bridge -- Cloud Storage Management Technology for Small File Based on Two-Dimensional Packing Algorithm -- Advertising Media Selection and Delivery Decision-making Using Influence Diagram -- The Application of Trusted Computing Technology in the Cloud Security -- The Application Level of E-commerce in Enterprises in China -- Toward a Trinity Model of Digital Education Resources Construction and Management -- Geographic Information System in the Cloud Computing Environment -- Part V: Embedded Systems -- Memory Controller Design Based on Quadruple Modular Redundant Architecture -- Computer Power Management System Based On the Face Detection -- Twist Rotation Deformation of Titanium Sheet Metal in Laser Curve Bending Based on Finite Element Analysis -- Voltage Transient Stability Analysis by Changing the Control Modes of the Wind Generator -- The Generator Stator Fault Analysis Based on the Multi-loop Theory -- An Improved Edge Flag Algorithm Suitable for Hardware Implementation -- A Handheld Controller with Embedded Real-time Video Transmission Based on TCP/IP Protocol.-Evaluating the Energy Consumption of InfiniBand Switch Based on Time Series -- Real-time Filtering Method Based on Neuron Filtering Mechanism and its Application on Robot Speed Signals -- Multiple View Spectral Embedded Clustering Using a Co-training Approach -- Feedback the Earliest Deadline First development Asynchronous Dynamic Voltage Scaling Hardware Assisted -- Design and Realization of General Interface Based on Object Linking and Embedding for Process Control -- A Stateful and Stateless IPv4/IPv6 Translator Based on Embedded System -- A Novel Collaborative Filtering Approach by Using Tags and Field Authorities -- Characteristics of Impedance for Plasma Antenna -- A Low Voltage 5.8-GHz Complementary Oxide-mental Semiconductor Transceiver Front-end Chip Design for Dedicated Short-range Communicatio.
Record Nr. UNINA-9910299498403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Emerging technologies for information systems, computing, and management / / W. Eric Wong and Tinghuai Ma, editors
Emerging technologies for information systems, computing, and management / / W. Eric Wong and Tinghuai Ma, editors
Edizione [1st ed. 2013.]
Pubbl/distr/stampa New York, : Springer, 2013
Descrizione fisica 1 online resource (1295 p.)
Disciplina 004
Altri autori (Persone) WongW. Eric
MaTinghuai
Collana Lecture notes in electrical engineering
Soggetto topico Information technology
Computer software
ISBN 9781461470106
1461470102
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Design for High Dynamic GPS Receiver in a Combinated Method of FLL and PLL -- The Modeling of Grid Workflow Service Based on GSCPN -- A Voice Conversion Method Based on the Separation of Speaker-specific Characteristics -- The Application of Information Security on the Computer Terminals of 3rd-generation Nuclear Power Plant -- Comprehensive Feature Index for Meridian Information Based on Principal Component Projection -- The Centralized Maintenance Mode of SAP System Based on Finance Shared Service Center -- An improved Method of Polyphase Filter Banks Channelization -- An Approach for Large Scale Retrieval Using Peer-to-Peer Network Based on Interest Community -- A RouterUpdate Method for Tor Anonymous Communication System -- Management of Construction Schedules Based on Building Information Modeling Technology -- P-Hub Airline Network Design Incorporating Interaction Between Elastic Demand and Network Structure -- Aggregation Operators of Interval Grey Numbers and Their use  in Grey Multi-attribute Decision- Making -- The Information Discovery Service of Electronic Product Code Network -- Modeling Goals for Information System by a Heuristic Way -- Environment Monitoring System Based on Internet of Things -- Utility Theory Based Approach for Converged Telecommunications Applications -- Open the Black Box of Information Technology Artifact: Underlying Technological Characteristics Dimension and its Measurement -- Joint Optimization about Pattern Synthesis of Circular Arrays Based on the Niche Genetic Algorithm -- The Application of Wavelet Analysis and BP Neural Network for the Early Diagnosis of Coronary Heart Disease -- Using More Initial Centers for the Seeding-based Semi-supervised K-harmonic Means Clustering -- Analysis and Optimization of CFS Scheduler on NUMA-based Systems -- Web Crawler for Event-Driven Crawling of AJAX-Based Web Applications -- On the Universal Approximation Capability of Flexible Approximate Identity Neural Networks -- A Spectral Clustering Algorithm Based on Particle Swarm Optimization -- A Framework for Porting Linux OS to a cc-NUMA Server Based on Loongson Processors -- Optimization for the Locations of B2C E-Commerce Distribution Network Based on an Improved Genetic Algorithm -- An Improved Multi-Objective Differential Evolution Algorithm with an Adaptive Crossover Rate -- Research on Semantic Based Distributed Service Discovery in P2P Environments/Networks -- Fast String Matching Algorithm Based on the Skip Algorithm -- Burst Signal Sorting Based on the Phase Continuity -- Fast Recapture and Positioning Algorithm Based on PMF-FFT Structure -- An Evaluation Computing Method Based on Cloud Model with Core Space and Its Application: Bridges Management Evaluation -- A Game Theory Based MapReduce Scheduling Algorithm -- Dynamic USBKEY System on Multiple Verification Algorithm -- Anomaly Detection Algorithm Based on Pattern Density in Time Series -- Integrative Optimal Design of Experiments with Multiple Sources -- Fast Image Reconstruction Algorithm for Radio Tomographic Imaging -- Reliability Monitoring Algorithm in Multi-constellation Satellite Navigation -- CTL Model Checking Algorithm Using MapReduce -- LBSG: a Load Balancing Scenario Based on Genetic Algorithm -- Improved Ant Colony Algorithm for the Constrained Vehicle Routing -- Active Queue Management Mechanism Based on DiffServ in MPLS Networks -- The Analysis and Implementation of Universal Workflow with Partition Algorithm on Finite Field -- Optimization for the Logistics Network of Electric Power Enterprise Based on a Mixed MCPSO and Simulated Annealing Algorithm -- Bi-level Programming Model and Taboo Search Algorithm in Industrial Location under the condition of Random Price -- Electrophysiological Correlates of Processing Visual Target Stimuli during a Visual Oddball Paradigm: an Event-related Potential Study -- Realization of Equipment Simulation Training System Based on Virtual Reality Technology -- Super Sparse Projection Reconstruction of Computed Tomography Image Based-on Reweighted Total Variation.-Sea Wave Filter Design for Cable-height Control system of Anti-submarine Helicopter -- Reversible Watermarking Based on Prediction-Error Expansion for 2D Vector Maps -- An Object Tracking Approach Based on Hu Moments and ABCshift -- Motion Blur Identification Using Image Statistics for Coded Exposure Photography -- Medical Images Fusion using Parameterized Logarithmic Image Processing Model and Wavelet Sub-band Selection Schemes -- Insect Extraction Based on the Improved Color Channel Comparison Method -- Combining Steerable Pyramid and Gaussian Mixture Models for Multi-Modal Remote Sensing Image Registration -- Offset Modify in Histogram Testing of Analog-to-digital Converter Based on Sinewave -- Image Text Extraction Based on Morphology and Color Layering -- Face Detection Using Ellipsoid Skin Model -- Emergency Pre-Warning Decision Support System Based on Ontology and Swrl -- Feature Reduction Using Locally Linear Embedding and Distance Metric Learning -- An Autonomous Rock Identification Method for Planetary Exploration -- Recognition of CD4 Cell Images Based on SVM with an Improved Parameter -- A Method of Automatic Regression Test Scope Selection Using Features Digraph -- The Development of the Wireless Vehicle Detector Data Receiving and Processing Host System -- The Feature Extraction of Rolling Bearing Fault Based on Wavelet Packet- empirical mode decomposition and Kurtosis Rule -- Robot Perception Based on Different Computational Intelligence Techniques -- Study on Technique for GPS IF Signal Simulation -- New Method of Image Denoising Based on Fractional Wavelet Transform -- Semantic Representation of Role & Task Based Access Control -- New Immersive Display System Based on Single Projector and Curved Surface Reflector -- Self-Adaptive Cloth Simulation Method Based on Human Ring Data -- Combination Approach of SVM Ensembles and Resampling Method for Imbalanced Datasets -- Join Optimization for Large-scale Data Analysis in MapReduce -- Key Technologies of Data Preparation for Simulation Systems -- Suspend-to-PCM: A New Power-Aware Strategy for Operating System's Rapid Suspend and Resume -- A Web Content Recommendation Method Based on Data Provenance Tracing and Forecasting -- Research and Implementation of Massive Data Atlas Visual Strategy -- The Autonomous System Topology Build Method Based on Multi-Source Data Fusion -- Salinity Time Series Prediction and Forecasting Using Dynamic Neural Networks in the Qiantang River Estuary -- An Adaptive Packet Loss Recovery Method for Peer-to-Peer Video Streaming over Wireless Mesh Network.-Measurement of Deformed Surface and Key Data Processing Based on Reverse Engineering -- Post-Hoc Evaluation Model for Development Workload of Gait Characteristic Database System -- Acquisition Time Performance of Initial Cell Search in 3GPP LTE System -- Multi-Agent System Set for Software Maintainability Design -- Wireless Video Transmission System Based on WIFI -- The Self-adapted Taxi Dispatch Platform Based on Geographic Information System -- Contract-based Combined Component Interaction Graph Generation -- An Improved Weighted Averaging Method for Evidence Fusion -- Optimization for Family Energy Consumption in Real-time Pricing Environment -- The Implementation with the Network Data Security on the Secure Desktop -- The Integration of Temporal Database and Vague Set -- New Regional Investors Discovery by Web Mining -- Enhancing Ability of Fault Detection for Component Systems Based on Object Interactions Graph -- A Method  of Deploying Virtual Machine on Multi-Core CPU in Decomposed Way -- An MDA Based Widget Development Framework -- Design of Real-Time Fire Evacuees’ State Information Verification System for Fire Rescue -- Detection and Analysis of Unidirectional Links in Mobile Ad Hoc Network under Nuclear Power Plants Environment -- Real-time Motion Detection in Dynamic Scenes -- Using Kohonen Cluster to Identify Time-of-day Break Points of Intersection -- Botnet Emulation: Challenges and Techniques -- A New System for Summoning and Scheduling Taxis -- A Social Interest Indicator Based Mobility Model for Ad Hoc Network -- Topological Map and Probability Model of the Multiple Plane and Multiple Stage Packet Switching Fabric -- Virtual Reality Enhanced Rehabilitation Training Robot for Early Spinal Cord Injury -- Syntactic Rules of Spatial Relations in Natural Language -- An Improved Plagiarism Detection Method - Model and Sample -- The Application of I/O Virtualization Framework in TaiShan Nuclear Power Plant -- Application of Virtual Reality Techniques for Simulation in Nuclear Power Plant -- SCM-BSIM: A Non-Volatile Memory Simulator Based on BOCHS -- Model of Horizontal Technological Alliance Based on Energy Efficiency -- Evaluating Life-cycle Matrix Model for Mobile Social Network -- Regulation and Environmental Innovation: Effect and Regional Disparities in China -- The Organizational Innovation Path Formation Mechanism of Innovative-oriented Enterprises  Based on Effect Elements -- Assessment of S&T Progress’ Share in China Provincial Economy Growth -- Inter-firm Innovation Networks: the Impact of Scale-free Property on Firm Innovation -- Dynamic Analysis on Significant Risk of Innovative Enterprise during the Strategic Transformation Period -- The Development of State-level Science and Technology Industrial Parks in China: Industry Clustering or Enterprises Gathering? -- Evaluation of Person-Job Fit on Knowledge Workers Integrating AHP and BP Neural Network -- Discussion of ITM-based Human Resources Planning and Management: an Example of W Corporation -- Is Inequality or Deficiency the Real Trouble?—The Influencing Factors of the Income Satisfaction of Chinese Sci-tech Personnel -- Understanding College Students’ Knowledge Sharing Willingness in Virtual Academic Community:A Survey Study -- An Application of Entrepreneurship Score Model in Col.
Record Nr. UNINA-9910437771503321
New York, : Springer, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of software fault localization : foundations and advances / / edited by W. Eric Wong, T. H. Tse
Handbook of software fault localization : foundations and advances / / edited by W. Eric Wong, T. H. Tse
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2023]
Descrizione fisica 1 online resource (611 pages)
Disciplina 005.1
Soggetto topico Software failures
Software failures - Data processing
Debugging in computer science
Computer software - Quality control
ISBN 1-119-88092-0
1-119-29181-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright Page -- Contents -- Editor Biographies -- List of Contributors -- Chapter 1 Software Fault Localization: an Overview of Research, Techniques, and Tools -- 1.1 Introduction -- 1.2 Traditional Fault Localization Techniques -- 1.2.1 Program Logging -- 1.2.2 Assertions -- 1.2.3 Breakpoints -- 1.2.4 Profiling -- 1.3 Advanced Fault Localization Techniques -- 1.3.1 Slicing-Based Techniques -- 1.3.2 Program Spectrum-Based Techniques -- 1.3.2.1 Notation -- 1.4 Subject Programs -- 1.5 Evaluation Metrics -- 1.6 Software Fault Localization Tools -- 1.7 Critical Aspects -- 1.7.1 Fault Localization with Multiple Bugs -- 1.7.2 Inputs, Outputs, and Impact of Test Cases -- 1.7.3 Coincidental Correctness -- 1.7.4 Faults Introduced by Missing Code -- 1.7.5 Combination of Multiple Fault Localization Techniques -- 1.7.6 Ties Within Fault Localization Rankings -- 1.7.7 Fault Localization for Concurrency Bugs -- 1.7.8 Spreadsheet Fault Localization -- 1.7.9 Theoretical Studies -- 1.8 Conclusion -- 1.8 Notes -- References -- Chapter 2 Traditional Techniques for Software Fault Localization -- 2.1 Program Logging -- 2.2 Assertions -- 2.3 Breakpoints -- 2.4 Profiling -- 2.5 Discussion -- 2.6 Conclusion -- References -- Chapter 3 Slicing-Based Techniques for Software Fault Localization -- 3.1 Introduction -- 3.2 Static Slicing-Based Fault Localization -- 3.2.1 Introduction -- 3.2.2 Program Slicing Combined with Equivalence Analysis -- 3.2.3 Further Application -- 3.3 Dynamic Slicing-Based Fault Localization -- 3.3.1 Dynamic Slicing and Backtracking Techniques -- 3.3.2 Dynamic Slicing and Model-Based Techniques -- 3.3.3 Critical Slicing -- 3.3.3.1 Relationships Between Critical Slices (CS) and Exact Dynamic Program Slices (DPS) -- 3.3.3.2 Relationship Between Critical Slices and Executed Static Program Slices -- 3.3.3.3 Construction Cost.
3.3.4 Multiple-Points Dynamic Slicing -- 3.3.4.1 BwS of an Erroneous Computed Value -- 3.3.4.2 FwS of Failure-Inducing Input Difference -- 3.3.4.3 BiS of a Critical Predicate -- 3.3.4.4 MPSs: Dynamic Chops -- 3.3.5 Execution Indexing -- 3.3.5.1 Concepts -- 3.3.5.2 Structural Indexing -- 3.3.6 Dual Slicing to Locate Concurrency Bugs -- 3.3.6.1 Trace Comparison -- 3.3.6.2 Dual Slicing -- 3.3.7 Comparative Causality: a Causal Inference Model Based on Dual Slicing -- 3.3.7.1 Property One: Relevance -- 3.3.7.2 Property Two: Sufficiency -- 3.3.8 Implicit Dependences to Locate Execution Omission Errors -- 3.3.9 Other Dynamic Slicing-Based Techniques -- 3.4 Execution Slicing-Based Fault Localization -- 3.4.1 Fault Localization Using Execution Dice -- 3.4.2 A Family of Fault Localization Heuristics Based on Execution Slicing -- 3.4.2.1 Heuristic I -- 3.4.2.2 Heuristic II -- 3.4.2.3 Heuristic III -- 3.4.3 Effective Fault Localization Based on Execution Slices and Inter-block Data Dependence -- 3.4.3.1 Augmenting a Bad D(1) -- 3.4.3.2 Refining a Good D(1) -- 3.4.3.3 An Incremental Debugging Strategy -- 3.4.4 Other Execution Slicing-Based Techniques in Software Fault Localization -- 3.5 Discussions -- 3.6 Conclusion -- 3.6 Notes -- References -- Chapter 4 Spectrum-Based Techniques for Software Fault Localization -- 4.1 Introduction -- 4.2 Background and Notation -- 4.2.1 Similarity Coefficient-Based Fault Localization -- 4.2.2 An Example of Using Similarity Coefficient to Compute Suspiciousness -- 4.3 Insights of Some Spectra-Based Metrics -- 4.4 Equivalence Metrics -- 4.4.1 Applicability of the Equivalence Relation to Other Fault Localization Techniques -- 4.4.2 Applicability Beyond Fault Localization -- 4.5 Selecting a Good Suspiciousness Function (Metric) -- 4.5.1 Cost of Using a Metric -- 4.5.2 Optimality for Programs with a Single Bug.
4.5.3 Optimality for Programs with Deterministic Bugs -- 4.6 Using Spectrum-Based Metrics for Fault Localization -- 4.6.1 Spectrum-Based Metrics for Fault Localization -- 4.6.2 Refinement of Spectra-Based Metrics -- 4.7 Empirical Evaluation Studies of SBFL Metrics -- 4.7.1 The Construction of D* -- 4.7.2 An Illustrative Example -- 4.7.3 A Case Study Using D* -- 4.7.3.1 Subject Programs -- 4.7.3.2 Fault Localization Techniques Used in Comparisons -- 4.7.3.3 Evaluation Metrics and Criteria -- 4.7.3.3.1 The EXAM Score -- 4.7.3.3.2 Cumulative Number of Statements Examined -- 4.7.3.3.3 Wilcoxon Signed-Rank Test -- 4.7.3.4 Statement with Same Suspiciousness Values -- 4.7.3.5 Results -- 4.7.3.6 Effectiveness of D* with Different Values of * -- 4.7.3.7 D* Versus Other Fault Localization Techniques -- 4.7.3.8 Programs with Multiple Bugs -- 4.7.3.8.1 The Expense Score-Based Approach -- 4.7.3.8.2 The One-Bug-at-a-Time Approach -- 4.7.3.9 Discussion -- 4.7.3.9.1 Intuition -- 4.7.3.9.2 Best and Worst Effectiveness Versus Other Alternatives -- 4.7.3.9.3 Threats to Validity -- 4.8 Conclusion -- 4.8 Notes -- References -- Chapter 5 Statistics-Based Techniques for Software Fault Localization -- 5.1 Introduction -- 5.1.1 Tarantula -- 5.1.2 How It Works -- 5.2 Working with Statements -- 5.2.1 Techniques Under the Same Problem Settings -- 5.2.2 Statistical Variances -- 5.3 Working with Non-statements -- 5.3.1 Predicate: a Popular Trend -- 5.3.2 BPEL: a Sample Application -- 5.4 Purifying the Input -- 5.4.1 Coincidental Correctness Issue -- 5.4.2 Class Balance Consideration -- 5.5 Reinterpreting the Output -- 5.5.1 Revealing Fault Number -- 5.5.2 Noise Reduction -- 5.5.2 Notes -- References -- Chapter 6 Machine Learning-Based Techniques for Software Fault Localization -- 6.1 Introduction -- 6.2 BP Neural Network-Based Fault Localization.
6.2.1 Fault Localization with a BP Neural Network -- 6.2.2 Reduce the Number of Candidate Suspicious Statements -- 6.3 RBF Neural Network-Based Fault Localization -- 6.3.1 RBF Neural Networks -- 6.3.2 Methodology -- 6.3.2.1 Fault Localization Using an RBF Neural Network -- 6.3.2.2 Training of the RBF Neural Network -- 6.3.2.3 Definition of a Weighted Bit-Comparison-Based Dissimilarity -- 6.4 C4.5 Decision Tree-Based Fault Localization -- 6.4.1 Category-Partition for Rule Induction -- 6.4.2 Rule Induction Algorithms -- 6.4.3 Statement Ranking Strategies -- 6.4.3.1 Revisiting Tarantula -- 6.4.3.2 Ranking Statements Based on C4.5 Rules -- 6.4.3.2.1 Heuristic -- 6.4.3.2.2 Computing a Statement Ranking -- 6.4.3.2.3 Rule Selection -- 6.5 Applying Simulated Annealing with Statement Pruning for an SBFL Formula -- 6.6 Conclusion -- 6.6 Notes -- References -- Chapter 7 Data Mining-Based Techniques for Software Fault Localization -- 7.1 Introduction -- 7.2 Formal Concept Analysis and Association Rules -- 7.2.1 Formal Concept Analysis -- 7.2.2 Association Rules -- 7.3 Data Mining for Fault Localization -- 7.3.1 Failure Rules -- 7.3.2 Failure Lattice -- 7.4 The Failure Lattice for Multiple Faults -- 7.4.1 Dependencies Between Faults -- 7.4.2 Example -- 7.5 Discussion -- 7.5.1 The Structure of the Execution Traces -- 7.5.2 Union Model -- 7.5.3 Inter section Model -- 7.5.4 Nearest Neighbor -- 7.5.5 Delta Debugging -- 7.5.6 From the Trace Context to the Failure Context -- 7.5.7 The Structure of Association Rules -- 7.5.8 Multiple Faults -- 7.6 Fault Localization Using N-gram Analysis -- 7.6.1 Background -- 7.6.1.1 Execution Sequence -- 7.6.1.2 N-gram. Analysis -- 7.6.1.3 Linear Execution Blocks -- 7.6.1.4 Association Rule Mining -- 7.6.2 Methodology -- 7.6.3 Conclusion -- 7.7 Fault Localization for GUI Software Using N-gram Analysis -- 7.7.1 Background.
7.7.1.1 Representation of the GUI and Its Operations -- 7.7.1.2 Event Handler -- 7.7.1.3 N-gram -- 7.7.2 Association Rule Mining -- 7.7.3 Methodology -- 7.7.3.1 General Approach -- 7.7.3.2 N-gram Fault Localization Algorithm -- 7.8 Conclusion -- 7.8 Notes -- References -- Chapter 8 Information Retrieval-Based Techniques for Software Fault Localization -- 8.1 Introduction -- 8.2 General IR-Based Fault Localization Process -- 8.3 Fundamental Information Retrieval Techniques for Software Fault Localization -- 8.3.1 Vector Space Model -- 8.3.2 Topic Modeling -- 8.3.3 Word Embedding -- 8.4 Evaluation Metrics -- 8.4.1 Top-k Prediction Accuracy -- 8.4.2 Mean Reciprocal Rank (MRR) -- 8.4.3 Mean Average Precision (MAP) -- 8.5 Techniques for Different Scenarios -- 8.5.1 Text of Current Bug Report Only -- 8.5.1.1 VSM Variants -- 8.5.1.2 Topic Modeling -- 8.5.2 Text and History -- 8.5.2.1 VSM Variants -- 8.5.2.2 Topic Modeling -- 8.5.2.3 Deep Learning -- 8.5.3 Text and Stack/Execution Traces -- 8.6 Empirical Studies -- 8.7 Miscellaneous -- 8.8 Conclusion -- 8.8 Notes -- References -- Chapter 9 Model-Based Techniques for Software Fault Localization -- 9.1 Introduction -- 9.2 Basic Definitions and Algorithms -- 9.2.1 Algorithms for MBD -- 9.3 Modeling for MBD -- 9.3.1 The Value-Based Model -- 9.3.2 The Dependency-Based Model -- 9.3.3 Approximation Models for Debugging -- 9.3.4 Other Modeling Approaches -- 9.4 Application Areas -- 9.5 Hybrid Approaches -- 9.6 Conclusion -- 9.6 Notes -- References -- Chapter 10 Software Fault Localization in Spreadsheets -- 10.1 Motivation -- 10.2 Definition of the Spreadsheet Language -- 10.3 Cones -- 10.4 Spectrum-Based Fault Localization -- 10.5 Model-Based Spreadsheet Debugging -- 10.6 Repair Approaches -- 10.7 Checking Approaches -- 10.8 Testing -- 10.9 Conclusion -- 10.9 Notes -- References.
Chapter 11 Theoretical Aspects of Software Fault Localization.
Record Nr. UNINA-9910830449103321
Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 2011 ACM Symposium on Applied Computing
Proceedings of the 2011 ACM Symposium on Applied Computing
Autore Chu William
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2011
Descrizione fisica 1 online resource (1868 pages)
Collana ACM Conferences
Soggetto topico Engineering & Applied Sciences
Computer Science
ISBN 1-4503-0113-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Proceedings of the 2011 Association for Computing Machinery Symposium on Applied Computing
SAC'11 the 2011 ACM Symposium on Applied Computing, TaiChung, Taiwan - March 21 - 24, 2011
Record Nr. UNINA-9910376519103321
Chu William  
[Place of publication not identified], : ACM, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 3rd International Workshop on Automation of Software Test
Proceedings of the 3rd International Workshop on Automation of Software Test
Autore Zhu Hong
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2008
Descrizione fisica 1 online resource (94 pages)
Collana ACM Conferences
Soggetto topico Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti AST '08
Record Nr. UNINA-9910376405703321
Zhu Hong  
[Place of publication not identified], : ACM, 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 4th International Conference on Computer Engineering and Networks : CENet2014 / / edited by W. Eric Wong
Proceedings of the 4th International Conference on Computer Engineering and Networks : CENet2014 / / edited by W. Eric Wong
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (1252 p.)
Disciplina 004.6
621.39
Collana Lecture Notes in Electrical Engineering
Soggetto topico Electrical engineering
Computer networks
Communications Engineering, Networks
Computer Communication Networks
ISBN 3-319-11104-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Spatio-temporal Cluster Method for Trajectory Data -- Use Case Points Method of Software Size Measurement Based on Fuzzy Interference -- The ATPG Algorithm for Crosstalk Delay Faults of the High-speed Interconnection Circuits -- Application of Fuzzy-PID Control in Synchronization Control of Multi-Stepping Motor -- The Improved Bayesian Algorithm to Spam Filtering -- Evolution of Community Structure in Complex Networks -- The Thermal Power Enterprise Environmental Performance Evaluation Model Construct -- A Mobile Localization Algorithm Based on SPSO Algorithm -- A Fast and Accurate Algorithm of Subspace Spectrum Peak Search Based on Bisection Method -- A CRF-based Method for DDoS Attacks Detection -- Advanced SOM Algorithm Based on Extension Distance and Its Application -- A Trilateral Centroid Localization and Modification Algorithm for Wireless Sensor Network -- Simulation Study on Trajectory Tracking in Manipulator Based on the Iterative Learning Control Algorithm -- An Improved Gaussian Mixture Model and Its Application -- GPU Acceleration for the Gaussian Elimination in Magnetotelluric Occam Inversion Algorithm -- Artificial Neural Networks in Biomedicine Applications -- SOC Prediction Method of a New Lithium Battery Based on GA-BP Neural Network -- Compressive Sensing for Channel State Information (CSI) Feedback in MIMO Broadcast Channels -- Implementation and Performance Evaluation of the Fully-Enclosed-Region Upper Confidence Bound Applied to Trees Algorithm -- A New Linear Feature Item Weighting Algorithm -- Trust Value of the Role Access Control Model Based on Trust -- Universal Approximation by Generalized Mellin Approximate Identity Neural Networks -- Research and Application of Function Optimization Based on Artificial Fish Swarm Algorithm -- Robust Hand Tracker Using Joint Temporal Weighted Feature -- Combination of User's Judging Power and Similarity for Collaborative Recommendation Algorithm -- An Improved Naive Bayes Classifier Method in Public Opinion Analysis -- Oversea Risk Intelligence Monitoring Based on Computer Model -- Quality of Service Based Particle Swarm Optimization Scheduling in Cloud Computing -- Data Processing -- The Improvement of Database Retrieval Efficiency -- Improvement of TCP Performance in Satcom Links by Packet-loss Detection -- Key Management Scheme in Cluster for WSNs -- An Energy-Saving Method for Erasure-Coded Distributed Storage System -- LF: A Caching Strategy for Named Data Mobile Ad-hoc NETworks (MANET) -- Topological Characteristics of Class Collaborations -- Cluster Key Scheme Based on Bilinear Pairing for Wireless Sensor Networks -- The LDP Protocol Formal Description and Verification Based on CPN Model -- Self-adaptive Anomaly Detection Method for Hydropower Unit Vibration (RBF) Neural Network -- A Fast Distribution-based Clustering Algorithm for Massive Data -- The Design and Implementation of Virtual Experiment System Based on Universal Design -- Influences of Information Service to Economic Growth in Jilin Province -- Day-ahead Electricity Demand Forecasting with using Ahybrid Method -- Membrane System for the Decision-making Problem -- The Operational Model Management C/S System Based on RUP -- Decision Analysis Method Based on Improved Bayesian Rough Set and Evidence Theory under Incomplete Decision System -- An Enhanced Entropy-K Nearest Neighbor Algorithm Based on Attribute Reduction -- Synthetic Safety Analysis: A Systematic Approach in Combination of Fault Tree Analysis and Fuzzy Failure Modes and Effect Analysis -- Evaluation Model of Internet Service Provider Attraction Based on Gravity Model -- An Application of Ecological Adaptation Evaluation of Orthoptera in Daqinggou Nature Reserve Using SPSS -- Intelligent Diagnostics Applied Technology of Specialized Vehicle Based on Knowledge Reasoning -- On the Evaluation of Influence of Golf Website in China -- An Ensemble Learning Approach for Improving Drug-Target Interactions Prediction -- A Complementary Predictor for Collaborative Filtering -- Knowledge Discovery from Knowledge Bases with Higher-Order Logic -- Numerical Analysis on High-Altitude Air-Drop Impact Processing of Water Bag -- Heterogeneous Data Sources Synchronization Based on Man-in-the-Middle Attack -- Direct Forecast Method Based on ANN in Network Traffic Prediction -- Pattern Recognition -- Visual Simulation of Three Point Method Guidance Trajectory for Anti-tank Missile -- A Fast and Accurate Pupil Localization Method Using Gray Gradient Differential and CurveFitting -- A Method for the Chinese-Tibetan Machine Translation System's Syntactic Analysis -- Analysis of Micro-Doppler Features of Armored Vehicle Based on EMD -- Kinect Based 3D Color Reconstruction -- Application of Image Retrieval Based on the Improved Local Binary Pattern -- Intelligent Detection of Complex Gap in Live Working Based on Video -- Face Detection Based on Landmark Localization -- Implement Image Enhancement Using Fractional Order Differential -- An Improved Fractional Differential Method for Image Enhancement -- On Qualitative Analysis of High-Contrast Patches in Range Images -- An Improved Tracking and Counting Method of the Moving Object Using Graph Cuts -- Automatic Detection of Pharyngeal Fricatives in Cleft Palate Speech -- An Improved Chinese Word Segmentation Disambiguation Model Based on Conditional Random Fields -- Mobile Real-time Monitoring System Basd On Human Action Recognition -- A Kind of Image Classification Method Study -- Weld Pool Image Processing and Feature Extraction Based on the Vision of the CO2 Welding -- On Energy Distribution Characteristics of Froth Images -- Classification Performances of Extreme Learning Machine with Choquet Integral -- Facial Expression Recognition Using Color-Depth Cameras -- Parallel Pipeline Implementation for Moving Objects Detection in Traffic Video Analysis on a Heterogeneous Platform -- A Novel Optical Flow Algorithm Based on Bionic Features for Robust Tracing -- An Obstacle Detection System in Mobile Robot Based on Radar-vision Fusion -- De-noising Method for Echocardiographic Images Based on the Second Generation Curvelet Transform -- A Novel Method for Image Segmentation Using Pulse Coupled Neural Network Based on Root Mean Square of Grayscale -- Combinded Similarity Based Spectral Clustering Ensemble for PolSAR Land Cover Classification -- An Algorithm for Human Face Detection in Color Image Based on Skin Color Segmentation -- A Social Network Service-based Environment Monitoring System in Home.
Record Nr. UNINA-9910299848503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui