Sciweavers

2421 search results - page 199 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
DASFAA
2007
IEEE
138views Database» more  DASFAA 2007»
15 years 10 months ago
An Original Semantics to Keyword Queries for XML Using Structural Patterns
XML is by now the de facto standard for exporting and exchanging data on the web. The need for querying XML data sources whose structure is not fully known to the user and the need...
Dimitri Theodoratos, Xiaoying Wu
DATE
2006
IEEE
120views Hardware» more  DATE 2006»
15 years 9 months ago
Soft delay error analysis in logic circuits
— In this paper, we present an analysis methodology to compute circuit node sensitivity due to charged particle induced delay (timing) errors, Soft Delay Errors (SDE). We define...
Balkaran S. Gill, Christos A. Papachristou, Franci...
94
Voted
DATE
2007
IEEE
97views Hardware» more  DATE 2007»
15 years 10 months ago
Estimating functional coverage in bounded model checking
Formal verification is an important issue in circuit and system design. In this context, Bounded Model Checking (BMC) is one of the most successful techniques. But even if all sp...
Daniel Große, Ulrich Kühne, Rolf Drechs...
134
Voted
MICAI
2007
Springer
15 years 9 months ago
Learning Performance in Evolutionary Behavior Based Mobile Robot Navigation
Abstract. In this paper we utilize information theory to study the impact in learning performance of various motivation and environmental configurations. This study is done within...
Tomás Arredondo Vidal, Wolfgang Freund, C&e...
113
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Language recognition with discriminative keyword selection
One commonly used approach for language recognition is to convert the input speech into a sequence of tokens such as words or phones and then to use these token sequences to deter...
Fred S. Richardson, William M. Campbell