نتایج جستجو برای: reusable

تعداد نتایج: 10268  

2008
Matthew Cook

Examining the major differences between how traditional programs compute and our current understanding of how brains compute, I see only one key gap in our ability to carry out logical reasoning within neural networks using standard methods. I refer to this gap as the reusable symbol problem: How can neural systems use multiply-instantiatable symbols to represent arbitrary objects? This problem...

2004
David Martins de Matos Ricardo Ribeiro Nuno J. Mamede

We address the common and recurring problem of data reuse, focusing on the following topics: (i) the current state of affairs (in particular, problems with data); (ii) requirements for change; (iii) the proposed solution (its problems and advantages, as well as related work in this area), including the canonical-, I/O-, and data transformation models; (iv) maintenance issues; (v) implementation...

Journal: :American journal of critical care : an official publication, American Association of Critical-Care Nurses 2015
Nancy M Albert Terri Murray James F Bena Ellen Slifcak Joel D Roach Jackie Spence Alicia Burkle

BACKGROUND Disposable electrocardiographic lead wires (ECG-LWs) may not be as durable as reusable ones. OBJECTIVE To examine differences in alarm events between disposable and reusable ECG-LWs. METHOD Two cardiac telemetry units were randomized to reusable ECG-LWs, and 2 units alternated between disposable and reusable ECG-LWs for 4 months. A remote monitoring team, blinded to ECG-LW type, ...

1999
Simon Parker

Reusing software improves quality as well as productivity. In practice, it is hard to achieve significant levels of reuse in commercial applications beyond generic support software. This tutorial will present programming and design techniques for achieving more reuse. The first session will examine the obstacles to reuse in commercial data processing, and illustrate the potential benefits. The ...

2002
Amalia Todirascu-Courtier Eric Kow Laurent Romary

We propose a methodology for transforming NLP modules into reusable components that can be integrated it into a distributed and open architecture. We illustrate the methodology by showing the adaptations needed to transform an LTAG parser into a bundle of parsing and lexical services.

2004
Joseph Reisinger Kenneth O. Stanley Risto Miikkulainen

Topology and Weight Evolving Artificial Neural Networks (TWEANNs) have been shown to be powerful in nonlinear optimization tasks such as double pole-balancing. However, if the input, output, or network structures are high dimensional, the search space may be too large to search efficiently. If the symmetries inherent in many large domains were correctly identified and used to break the problem ...

2011
Juan de Lara Esther Guerra

Model-Driven Engineering promotes models as the principal artefacts of the development, hence model transformation techniques – like graph transformation – become key enablers for this development paradigm. In order to increase the adoption of Model-Driven Engineering in industrial practice, techniques aimed at raising the quality and productivity in model transformation development are needed....

Journal: :Advances in Computers 1991
Bruce W. Weide William F. Ogden Stuart H. Zweben

2010
Nadia Polikarpova Carlo A. Furia Bertrand Meyer

Reusable software components need well-defined interfaces, rigorously and completely documented features, and a design amenable both to reuse and to formal verification; all these requirements call for expressive specifications. This paper outlines a rigorous foundation to model-based contracts, a methodology to equip classes with expressive contracts supporting the accurate design, implementat...

Journal: :Journal of Object Technology 2004
Donald Firesmith

Unlike typical functional requirements, security requirements can potentially be highly reusable, especially if specified as instances of reusable templates. In this column, I will discuss the concepts underlying security engineering including its quality subfactors. I will then address the issue of security requirements and how they differ from the architectural mechanisms that will fulfill th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید