By Jan Janech, Jozef Kostolny, Tomasz Gratkowski

This ebook provides the complaints of the overseas convention SDOT which was once geared up on the collage in Žilina, school of administration Sciences and Informatics, Slovak Republic in November 19, 2015. The convention was once actually foreign either by way of the volume of overseas contributions and by way of composition of guidance and clinical committees. The publication and the convention serves as a platform alternate of data and adventure for the most recent traits in software program improvement and object-oriented applied sciences (theory and practice). This lawsuits current info at the most recent advancements and mediate the alternate of expertise among practitioners and academia.

Show description

Read or Download Proceedings of the 2015 Federated Conference on Software Development and Object Technologies PDF

Best intelligence & semantics books

An Introduction to Computational Learning Theory

Emphasizing problems with computational potency, Michael Kearns and Umesh Vazirani introduce a few valuable issues in computational studying conception for researchers and scholars in man made intelligence, neural networks, theoretical laptop technology, and information. Computational studying conception is a brand new and quickly increasing region of analysis that examines formal types of induction with the ambitions of studying the typical equipment underlying effective studying algorithms and determining the computational impediments to studying.

Minimum Error Entropy Classification

This ebook explains the minimal blunders entropy (MEE) suggestion utilized to info category machines. Theoretical effects at the internal workings of the MEE inspiration, in its software to fixing numerous type difficulties, are offered within the wider realm of possibility functionals. Researchers and practitioners additionally locate within the ebook an in depth presentation of functional information classifiers utilizing MEE.

Artificial Intelligence for Humans, Volume 1: Fundamental Algorithms

An excellent development calls for a powerful starting place. This booklet teaches easy man made Intelligence algorithms comparable to dimensionality, distance metrics, clustering, errors calculation, hill hiking, Nelder Mead, and linear regression. those aren't simply foundational algorithms for the remainder of the sequence, yet are very necessary of their personal correct.

Advances in Personalized Web-Based Education

This booklet goals to supply very important information regarding adaptivity in computer-based and/or web-based academic structures. which will make the coed modeling technique transparent, a literature overview touching on scholar modeling strategies and techniques up to now decade is gifted in a different bankruptcy.

Extra info for Proceedings of the 2015 Federated Conference on Software Development and Object Technologies

Sample text

An interesting concept about statistical memory modeling was published by Davy Genbrugge and Lieven Eeckhout in 2009 [30]. They extend statistical simulation methodology to model shared resources in the memory subsystem of multi-processors as shared caches, off-chip bandwidth and main memory. In a next step, we will examine how well suited this approach is for our work and if there is an additional benefit. An interesting article about energy modeling was published by Kerrision and Eder in 2015 [31].

Wakka=AlteraCycloneVHPS. Accessed 29 April 2015 23. : Instruction trace compression for rapid instruction cache simulation. In: Proceedings of the Conference on Design, Automation and Test in Europe, DATE 2007, pp. 803–808. EDA Consortium, San Jose (2007). 1266538 24. : Official NAS Parallel Benchmarks Website. html. Accessed 23 April 2015 25. : A discontinuous Galerkin method for three-dimensional shallow water equations. J. Sci. Comput. 22(1–3), 245–267 (2005) 26. : A three-dimensional discontinuous Galerkin model applied to the baroclinic simulation of Corpus Christi Bay.

Informatica (Slovenia) 32(1), 63–77 (2008) 5. : Smart surveillance: applications, technologies and implications. Inf. Commun. Signal Process. 2, 1133–1138 (2003) 6. : Computer vision workload analysis: case study of video surveillance systems. Intel Technol. J. 9, 109–118 (2005) 7. : Use of the hough transformation to detect lines and curves in pictures. Commun. ACM 15(1), 11–15 (1972). 361242 8. : Robust circle detection using a weighted MSE estimator. In: International Conference on Image Processing, vol.

Download PDF sample

Download Proceedings of the 2015 Federated Conference on Software by Jan Janech, Jozef Kostolny, Tomasz Gratkowski PDF
Rated 4.60 of 5 – based on 26 votes