Sciweavers

1518 search results - page 224 / 304
» Cryptographic Test Correction
Sort
View
101
Voted
GCB
1998
Springer
112views Biometrics» more  GCB 1998»
15 years 4 months ago
Combining diverse evidence for gene recognition in completely sequenced bacterial genomes
Analysis of a newly sequenced bacterial genome starts with identification of protein-coding genes. Functional assignment of proteins requires the exact knowledge of protein N-term...
Dmitrij Frishman, Andrey A. Mironov, Hans-Werner M...
ICCAD
1996
IEEE
141views Hardware» more  ICCAD 1996»
15 years 4 months ago
An observability-based code coverage metric for functional simulation
Functional simulation is the most widely used method for design verification. At various levels of abstraction, e.g., behavioral, register-transfer level and gate level, the design...
Srinivas Devadas, Abhijit Ghosh, Kurt Keutzer
103
Voted
CIKM
1997
Springer
15 years 4 months ago
Learning Belief Networks from Data: An Information Theory Based Approach
This paper presents an efficient algorithm for learning Bayesian belief networks from databases. The algorithm takes a database as input and constructs the belief network structur...
Jie Cheng, David A. Bell, Weiru Liu
ECML
1997
Springer
15 years 4 months ago
Constructing Intermediate Concepts by Decomposition of Real Functions
In learning from examples it is often useful to expand an attribute-vector representation by intermediate concepts. The usual advantage of such structuring of the learning problemi...
Janez Demsar, Blaz Zupan, Marko Bohanec, Ivan Brat...
FPGA
1997
ACM
145views FPGA» more  FPGA 1997»
15 years 4 months ago
Generation of Synthetic Sequential Benchmark Circuits
Programmable logic architectures increase in capacity before commercial circuits are designed for them, yielding a distinct problem for FPGA vendors: how to test and evaluate the ...
Michael D. Hutton, Jonathan Rose, Derek G. Corneil