نتایج جستجو برای: repairing

تعداد نتایج: 5797  

2013
Ricardo Terra Nunes Bueno Villela

Architectural erosion is a recurrent problem faced by software architects. Although several architecture conformance techniques have been proposed to detect architectural violations (e.g., reflexion models, dependency structure matrices, source code query languages, constraint languages, architecture description languages, and design tests), less research effort has been dedicated to the task o...

2005
Peter A. Flach Shaomin Wu

In this paper we investigate methods to detect and repair concavities in ROC curves by manipulating model predictions. The basic idea is that, if a point or a set of points lies below the line spanned by two other points in ROC space, we can use this information to repair the concavity. This effectively builds a hybrid model combining the two better models with an inversion of the poorer models...

2011
Giorgos Stoilos Bernardo Cuenca Grau Boris Motik Ian Horrocks

The need for scalable query answering often forces Semantic Web applications to use incomplete OWL 2 reasoners, which in some cases fail to derive all answers to a query. This is clearly undesirable, and in some applications may even be unacceptable. To address this problem, we investigate the problem of ‘repairing’ an ontology T —that is, computing an ontology R such that a reasoner that is in...

2004
Alexander Emelyanov Vaclav Skala

In practice of surface reconstruction it often happens that a used algorithm is not capable to reconstruct a CAD-model completely. In this work a method to repair defects of a CAD-model is offered. For surface reconstruction inside damaged regions this method uses force lines of a specially constructed tensor field. This method can be considered as a post-processing step for any surface reconst...

2013
Junguo Zhu Muyun Yang Sheng Li Tiejun Zhao

This paper proposes an example driven approach to improve the quality of MT system outputs. Specifically, We extend the system combination method in SMT to combine the examples by two strategies: 1) estimating the confidence of examples by the similarity between source input and the source part of examples; 2) approximating target word posterior probability by the word alignments of the bilingu...

2008
Brian Drabble Je Dalton Austin Tate

Even with the most careful advance preparation, and even with inbuilt allowance for some degree of contingency, plans need to be altered to take into account execution circumstances and changes of requirements. We have developed methods for repairing plans to account for execution failures and changes in the execution situation. We first developed these methods for the Optimum-AIV planner desi...

2005
Ford-Long Wong Frank Stajano Jolyon Clulow

We implement and demonstrate a passive attack on the Bluetooth authentication protocol used to connect two devices to each other. Using a protocol analyzer and a brute-force attack on the PIN, we recover the link key shared by two devices. With this secret we can then decrypt any encrypted traffic between the devices as well as, potentially, impersonate the devices to each other. We then implem...

1997
Brian Drabble Je Dalton Austin Tate

Even with the most careful advance preparation and even with inbuilt allowance for some degree of contin gency plans need to be altered to take into account execution circumstances and changes of requirements We have developed methods for repairing plans to ac count for execution failures and changes in the execu tion situation We rst developed these methods for the Optimum aiv planner designed...

1996
M. Anton Ertl Andreas Krall

1 I n t r o d u c t i o n Computer designers and computer architects have been striving to improve uniprocessor performance since the invention of computers. The next step in this quest for higher performance is the exploitation of significant amounts of instruction-level parallelism. Therefore, superscalar and VLIW (very large instruction word) machines have been designed, which can execute se...

Journal: :AMA journal of ethics 2017
Denise M Dudzinski Carrol Alvarez

Using a case example, we offer guidance for improving "difficult" clinician-patient relationships. These relationships may be repaired by acknowledging a clinician's part in conflict, empathizing with patients, identifying a patient's skill deficits, and employing communication and engagement techniques used by mental health professionals. Clinicians will inevitably take on more of the work of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید