Sciweavers

5675 search results - page 68 / 1135
» Exploiting Chaos for Computation
Sort
View
COLING
2010
14 years 4 months ago
Exploiting Paraphrases and Deferred Sense Commitment to Interpret Questions more Reliably
Creating correct, semantic representations of questions is essential for applications that can use formal reasoning to answer them. However, even within a restricted domain, it is...
Peter Clark, Philip Harrison
DAC
2012
ACM
13 years 10 days ago
Exploiting die-to-die thermal coupling in 3D IC placement
In this paper, we propose two methods used in 3D IC placement that effectively exploit the die-to-die thermal coupling in the stack. First, TSVs are spread on each die to reduce t...
Krit Athikulwongse, Mohit Pathak, Sung Kyu Lim
ACL
2012
13 years 9 days ago
Exploiting Social Information in Grounded Language Learning via Grammatical Reduction
This paper uses an unsupervised model of grounded language acquisition to study the role that social cues play in language acquisition. The input to the model consists of (orthogr...
Mark Johnson, Katherine Demuth, Michael C. Frank
ISCAS
2007
IEEE
104views Hardware» more  ISCAS 2007»
15 years 4 months ago
Noncoherent Correlation-Based Communication Systems Choosing Different Chaotic Maps
— This paper proposes a new noncoherent detection system improved based on the differential chaos shift keying (DCSK) and the correlation delay shift keying (CDSK). In this schem...
Shintaro Arai, Yoshifumi Nishio
ICPADS
2005
IEEE
15 years 3 months ago
Embedded Fingerprint Verification System
Fingerprint verification is one of the most reliable personal identification methods in biometrics. In this paper, an effective fingerprint verification system is presented. We de...
Gwo-Cheng Chao, Shung-Shing Lee, Hung-Chuan Lai, S...