Sciweavers

325 search results - page 41 / 65
» Analysis of the constraint proposal method for two-party neg...
Sort
View
140
Voted
DAWAK
2007
Springer
15 years 6 months ago
Mining Top-K Multidimensional Gradients
Several business applications such as marketing basket analysis, clickstream analysis, fraud detection and churning migration analysis demand gradient data analysis. By employing g...
Ronnie Alves, Orlando Belo, Joel Ribeiro
FMCAD
2007
Springer
15 years 6 months ago
Global Optimization of Compositional Systems
—Embedded systems typically consist of a composition of a set of hardware and software IP modules. Each module is heavily optimized by itself. However, when these modules are com...
Fadi A. Zaraket, John Pape, Adnan Aziz, Margarida ...
110
Voted
ICAPR
2005
Springer
15 years 6 months ago
A Novel Approach for Text Detection in Images Using Structural Features
We propose a novel approach for finding text in images by using ridges at several scales. A text string is modelled by a ridge at a coarse scale representing its center line and n...
H. Tran, Augustin Lux, H. L. Nguyen T, A. Boucher
112
Voted
COMCOM
1998
117views more  COMCOM 1998»
15 years 5 days ago
Specification, validation, and verification of time-critical systems
In this paper, we propose a new formalism, named the Timed Communicating Finite State Machine (Timed CFSM), for specifying and verifying time-critical systems. Timed CFSM preserve...
Shiuh-Pyng Shieh, Jun-Nan Chen
IJCAI
1989
15 years 1 months ago
Functional Representation of Designs and Redesign Problem Solving
gn problem can be abstractly characterized as a constrained function-to-structure mapping. The de­ sign task takes as input the specifications of the desired functions of a device...
Ashok K. Goel, B. Chandrasekaran