Applying AI to software renovation

被引:0
|
作者
Lockheed Martin Advanced Technology, Cent, Palo Alto, United States [1 ]
机构
来源
Autom Software Eng | / 3卷 / 341-360期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Applying ML Algorithms to Video Game AI
    Kopel, Marek
    Pociejowski, Adam
    COMPUTATIONAL COLLECTIVE INTELLIGENCE, PT I, 2019, 11683 : 353 - 362
  • [42] Sentiment Analysis of Customer for Ecommerce by Applying AI
    Aftab, M. Omer
    Ahmad, Umer
    Khalid, Shahid
    Saud, Amina
    Hassan, Arfa
    Farooq, Muhammad Sajid
    4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2, 2021, : 579 - 585
  • [43] APPLYING AI TO THE RIGHT NATIONAL SECURITY PROBLEMS
    Niewood, Eliahu H.
    AEROSPACE AMERICA, 2022, 60 (07) : 42 - 45
  • [44] Applying AI technique to construct a desired test
    Sun, KT
    ADVANCED RESEARCH IN COMPUTERS AND COMMUNICATIONS IN EDUCATION, VOL 2: NEW HUMAN ABILITIES FOR THE NETWORKED SOCIETY, 1999, 55 : 117 - 124
  • [45] Lessons learned from applying AI to the Web
    Fensel, D
    Angele, J
    Decker, S
    Erdmann, M
    Schnurr, HP
    Studer, R
    Witt, A
    INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2000, 9 (04) : 361 - 382
  • [46] APPLYING AI IN JIGS AND FIXTURES DESIGN.
    Nee, A.Y.C.
    Bhattacharyya, N.
    Poo, A.N.
    1600, (03):
  • [47] Applying AI to structural safety monitoring and evaluation
    Salvaneschi, P
    Cadei, M
    Lazzari, M
    IEEE INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 1996, 11 (04): : 24 - 34
  • [48] Applying inexpensieve AI techniques to computer games
    Khoo, A
    Zubek, R
    IEEE INTELLIGENT SYSTEMS, 2002, 17 (04) : 48 - 53
  • [49] Applying Behavior Models in a System Architecture (Applying an Engineering Protocol Structure to AI)
    Toy, Bruce L.
    2014 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE FOR HUMAN-LIKE INTELLIGENCE (CIHLI), 2014, : 60 - 69
  • [50] Software Reliability Based on Software Measures Applying Bayesian Technique
    Senathi, Anitha
    Vinod, Gopika
    Jadhav, Dipti
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3, 2016, 381 : 167 - 173