بدائل البحث:
testing algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data detection » data injection (توسيع البحث)
testing algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data detection » data injection (توسيع البحث)
-
21
A comparative study of five regression testing algorithms
منشور في 1997"…We compare five regression testing algorithms that include: slicing, incremental, firewall, genetic and simulated annealing algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
22
Simulated Annealing and Genetic Algorithms for Optimal Regression Testing
منشور في 1999"…The algorithms are based on an integer programming problem formulation and the program’s control flow graph. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
23
An incremental approach for test scheduling and synthesis using genetic algorithms
منشور في 2017"…The method is based on a genetic algorithm that efficiently explores the testable design space. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
24
Concurrent BIST Synthesis and Test Scheduling Using Genetic Algorithms
منشور في 2007"…The method is based on a genetic algorithm that efficiently explores the testable design space and finds a sub-optimal test registers assignment for each k-test session. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
25
A genetic algorithm for corrective retesting. (c1995)
منشور في 1995احصل على النص الكامل
احصل على النص الكامل
masterThesis -
26
Intelligent Rapidly-Exploring Random Tree Star Algorithm
منشور في 2024احصل على النص الكامل
doctoralThesis -
27
Metaheuristic algorithm for testing web 2.0 applications. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
28
Design of adaptive arrays based on element position perturbations
منشور في 1993"…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …"
احصل على النص الكامل
احصل على النص الكامل
article -
29
Trial-based dominance for comparing both the speed and accuracy of stochastic optimizers with standard non-parametric tests
منشور في 2023"…<p>Non-parametric tests can determine the better of two stochastic optimization algorithms when benchmarking results are ordinal—like the final fitness values of multiple trials—but for many benchmarks, a trial can also terminate once it reaches a prespecified target value. …"
-
30
Regression testing web services-based applications
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
31
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …"
احصل على النص الكامل
-
32
UML-based regression testing for OO software
منشور في 2010"…When working with large and complex object-oriented systems, source code-based regression testing is usually costly. This paper proposes a programming-language-independent technique for regression test selection for object-oriented software based on Unified Modeling Language (UML 2.0) design diagrams. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
33
A hybrid distributed test generation method using deterministic and genetic algorithms
منشور في 2017"…The deterministic phase is based on the D-algorithm and generates an initial set of test vectors that are evolved in the genetic phase in order to achieve high fault coverage in a short time. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
34
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
احصل على النص الكامل
-
35
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
منشور في 2016الموضوعات: احصل على النص الكامل
doctoralThesis -
36
-
37
Power-constrained system-on-a-chip test scheduling using a genetic algorithm
منشور في 2006"…This paper presents an efficient approach for the test scheduling problem of core-based systems based on a genetic algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
38
-
39
Parallel Algorithms for Distinguishing Nondeterministic Finite State Machines
منشور في 2015احصل على النص الكامل
doctoralThesis -
40