Sciweavers

2421 search results - page 183 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
117
Voted
DATE
2003
IEEE
99views Hardware» more  DATE 2003»
15 years 9 months ago
Fast Computation of Data Correlation Using BDDs
Data correlation is a well-known problem that causes difficulty in VLSI testing. Based on a correlation metric, an efficient heuristic to select BIST registers has been proposed...
Zhihong Zeng, Qiushuang Zhang, Ian G. Harris, Maci...
126
Voted
SAC
2008
ACM
15 years 3 months ago
Efficient concept clustering for ontology learning using an event life cycle on the web
Ontology learning integrates many complementary techniques, including machine learning, natural language processing, and data mining. Specifically, clustering techniques facilitat...
Sangsoo Sung, Seokkyung Chung, Dennis McLeod
129
Voted
CAISE
2005
Springer
15 years 9 months ago
Query Processing Using Ontologies
Abstract. Recently, the database and AI research communities have paid increased attention to ontologies. The main motivating reason is that ontologies promise solutions for comple...
Chokri Ben Necib, Johann Christoph Freytag
IJCAI
2007
15 years 5 months ago
Using Learned Policies in Heuristic-Search Planning
Many current state-of-the-art planners rely on forward heuristic search. The success of such search typically depends on heuristic distance-to-the-goal estimates derived from the ...
Sung Wook Yoon, Alan Fern, Robert Givan
132
Voted
VRML
1999
ACM
15 years 7 months ago
An Open Virtual Environment for Autonomous Agents Using VRML and Java
We describe a VRML/Java-based virtual environment that is populated with heterogeneous articulated agents. In this simulated environment, agents compete for collecting certain obj...
Bernhard Jung, Jan-Torsten Milde