Author:
Gandini Stefano,Ruzzarin Walter,Sanchez Ernesto,Squillero Giovanni,Tonda Alberto
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference26 articles.
1. Adrion WR, Branstad MA, Cherniavsky JC (1982) Validation, verification and testing of computer software. ACM Comput Surv (CSUR) 14(2)
2. Brause R, Langsdorf T, Hepp M (1999) Neural data mining for credit card fraud detection, ICTAI, pp 103, 11th IEEE International Conference on Tools with Artificial Intelligence
3. Cinque M, Cotroneo D, Kalbarczyk Z, Iyer RK (June, 2007) How do mobile phones fail? A failure data analysis of symbian OS smart phones. In: Dependable systems and networks, 2007. DSN ‘07. 37th Annual IEEE/IFIP International Conference on, pp 585–594
4. Corno F, Sanchez E, Squillero G (2005) Evolving assembly programs: how games help microprocessor validation. IEEE Transactions on Evolutionary Computation, Special Issue on EC and Games 9:695–706
5. Darwin C (1859) On the origin of species, Chapter IV
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献