Sciweavers

2062 search results - page 348 / 413
» Derivatives of Logical Formulas
Sort
View
EUSFLAT
2009
220views Fuzzy Logic» more  EUSFLAT 2009»
14 years 8 months ago
Web Usage Mining: users' navigational patterns extraction from web logs using ant-based clustering method
Web Usage Mining is the process of applying data mining techniques to the discovery of usage patterns from data extracted from Web Log files. It mines the secondary data (web logs)...
Kobra Etminani, Mohammad R. Akbarzadeh-Totonchi, N...
ISQED
2011
IEEE
230views Hardware» more  ISQED 2011»
14 years 2 months ago
Constraint generation for software-based post-silicon bug masking with scalable resynthesis technique for constraint optimizatio
Due to the dramatic increase in design complexity, verifying the functional correctness of a circuit is becoming more difficult. Therefore, bugs may escape all verification effo...
Chia-Wei Chang, Hong-Zu Chou, Kai-Hui Chang, Jie-H...
TMC
2012
13 years 1 months ago
A Statistical Mechanics-Based Framework to Analyze Ad Hoc Networks with Random Access
—Characterizing the performance of ad hoc networks is one of the most intricate open challenges; conventional ideas based on information-theoretic techniques and inequalities hav...
Sunil Srinivasa, Martin Haenggi
TMC
2012
13 years 1 months ago
Network Coding in Cooperative Communications: Friend or Foe?
—A major benefit of employing network coding (NC) in cooperative communications (CC) is its ability to reduce time-slot overhead. Such approach is called network-coded CC (or NC...
Sushant Sharma, Yi Shi, Jia Liu, Y. Thomas Hou, Sa...
ICIP
2002
IEEE
16 years 18 days ago
Fuzzy color signatures
With the large and increasing amount of visual information available in digital libraries and the Web, efficient and robust systems for image retrieval are urgently needed. In thi...
Andrés Dorado, Ebroul Izquierdo