搜索结果: 1-15 共查到“计算机科学技术 Techniques”相关记录32条 . 查询时间(0.078 秒)
Workshop on Employing Computational Intelligence Techniques for Testing and Validating Complex CPSs
Testing using computational intelligence technology seminars verification is complex independence the host
2017/6/29
Cyber-Physical Systems (CPSs) integrate digital technologies with physical processes. As compared to conventional software, CPSs include real-time processing units, networks, physical processes (such ...
Workshop on Employing Computational Intelligence Techniques for Testing and Validating Complex CPSs
Employing Computational Intelligence Technique Validating Complex CPSs
2017/6/21
Cyber-Physical Systems (CPSs) integrate digital technologies with physical processes. As compared to conventional software, CPSs include real-time processing units, networks, physical processes (such ...
第十届EAI国际仿真工具与技术国际会议(10th EAI International Conference on Simulation Tools and Techniques)
第十届 EAI 国际仿真工具 技术 国际会议
2017/5/23
SIMUTools 2017 is the 10th edition of the annual International Conference on Simulation Tools and Techniques. The conference focuses on a broad range of research challenges in the field of simulation,...
2017年电信,电力分析和计算技术国际会议(2017 International Conference on Telecommunication, Power Analysis and Computing Techniques) (ICTPACT)
2017年 电信 电力分析 计算技术 国际会议
2017/3/27
The Main theme of the conference is to explore the emerging Technical Advancement in Power systems and Communications. Two tracks with the first track focusing smart grids, Renewable energy, VLSI, Der...
Building a Better Backtrace: Techniques for Postmortem Program Analysis
Building Better Backtrace Techniques Postmortem Program Analysis
2016/5/25
After a program has crashed, it can be difficult to reconstruct why the failure occurred, or what actions led to the error. We propose a family of analysis techniques that use the evidence left behind...
Phrasing Techniques for Multi-Stroke Selection Gestures
phrasing tablets gestures pen input multiple strokes
2016/5/24
Pen gesture interfaces have difficulty supporting arbitrary
multiple-stroke selections because lifting the pen introduces
ambiguity as to whether the next stroke should add to the existing
selectio...
Static Analysis Techniques for Predicting the Behavior of Active Database Rules
Static Analysis Techniques Predicting Behavior Active Database Rules
2016/5/24
Methods are given for statically analyzing sets of database production rules to determine if the rules are (1) guaranteed to terminate, (2) guaranteed to produce a unique nal database state, and (3) ...
RICH INTERACTIVE MAPPING EXPERIENCE THROUGH OPEN SOURCE FRAMEWORKS AND AJAX DATA VISUALIZATION TECHNIQUES
Online mapping data visualization regional urban indicators
2016/2/29
Community indicator projects across America seek to understand and analyze the inter-relationships of multiple issues over a given
geographic area, typically within an urban region or city. While map...
New ‘Performance Cloning’ Techniques Designed to Boost Computer Chip Memory Systems Design
Performance Cloning Boost Computer Chip Memory Systems Design
2015/10/13
Memory Controller and DRAM architecture are critical aspects of Chip Multi Processor (CMP) design. A good design needs an in-depth understanding of end-user workloads. However, designers rarely get in...
A Survey of Two Signature Aggregation Techniques
Signature Aggregation Techniques signature scheme
2015/8/5
We survey two recent signature constructions that support signature aggregation: Given n signatures on n distinct messages from n distinct users, it is possible to aggregate all these signatures into ...
Detection of Cognitive States from fMRI data using Machine Learning Techniques
Sequence Learning fMRI visuomotor Naive Bayes Classifier Support Vector machine Nearest neighbour classification
2015/7/29
Over the past decade functional Magnetic Resonance Imaging (fMRI) has emerged as a powerful technique to locate activity of human brain while engaged in a particular task or cognitive state. We consid...
Data Survey and Management Techniques in Civil Protection Emergencies
Earthquakes Forest fire GIS
2015/7/7
Calamitous events cause modifications in soil morphology and damages in infrastructures. The knowledge of these modifications
can be very useful for the Civil Protection operations. However, survey o...
DEVELOPMENT OF COMPUTATIONAL TECHNIQUES FOR TRANSONIC FLOWS:AN HISTORICAL PERSPECTIVE
COMPUTATIONAL TECHNIQUES RANSONIC FLOWS HISTORICAL PERSPECTIVE
2015/7/2
The history of computational fluid dynamics (CFD), especially as driven by the requirements of transonic flow prediction, has been largely coincident with the history of these Symposia. Th...
Improving Processes Using Static Analysis Techniques
Fault tree analysis Finite state verification Process improvement
2014/12/18
Real-world processes often undergo improvements to meet certain goals, such as coping with changed requirements, eliminating defects, improving the quality of the products, and reducing costs. Identif...
Software Techniques to Reduce the Energy Consumption of Low-Power Devices at the Limits of Digital Abstractions
embedded systems energy low-power rfid security storage
2014/12/18
My thesis explores the effectiveness of software techniques that bend digital abstractions in order to allow embedded systems to do more with less energy. Recent years have witnessed a proliferation o...