Sciweavers

1494 search results - page 92 / 299
» Less Extreme Programming
Sort
View
DATE
2010
IEEE
161views Hardware» more  DATE 2010»
15 years 7 months ago
BISD: Scan-based Built-In self-diagnosis
Abstract—Built-In Self-Test (BIST) is less often applied to random logic than to embedded memories due to the following reasons: Firstly, for a satisfiable fault coverage it may...
Melanie Elm, Hans-Joachim Wunderlich
AGENTS
2001
Springer
15 years 7 months ago
An auction-based method for decentralized train scheduling
We present a computational study of an auction-based method for decentralized train scheduling. The method is well suited to the natural information and control structure of moder...
David C. Parkes, Lyle H. Ungar
IMA
2001
Springer
134views Cryptology» more  IMA 2001»
15 years 7 months ago
Almost-Certainly Runlength-Limiting Codes
Standard runlength-limiting codes – nonlinear codes defined by trellises – have the disadvantage that they disconnect the outer errorcorrecting code from the bit-by-bit likeli...
David J. C. MacKay
IUI
2000
ACM
15 years 6 months ago
Efficient text summarization using lexical chains
The rapid growth of the Internet has resulted in enormous amounts of information that has become more difficult to access efficiently. Internet users require tools to help manage ...
H. Gregory Silber, Kathleen F. McCoy
91
Voted
ISIPTA
1999
IEEE
15 years 6 months ago
Modeling Ellsberg's Paradox in Vague-Vague Cases
We explore a generalization of Ellsberg's paradox (2color scenario) to the Vague-Vague (V-V) case, in which neither of the probabilities (urns) is specified precisely, but on...
Karen M. Kramer, David V. Budescu