Sciweavers

2299 search results - page 405 / 460
» Logical Data Expiration
Sort
View
FSS
2007
102views more  FSS 2007»
14 years 11 months ago
Extraction of fuzzy rules from support vector machines
The relationship between support vector machines (SVMs) and Takagi–Sugeno–Kang (TSK) fuzzy systems is shown. An exact representation of SVMs as TSK fuzzy systems is given for ...
Juan Luis Castro, L. D. Flores-Hidalgo, Carlos Jav...
TCAD
2008
118views more  TCAD 2008»
14 years 11 months ago
CHIPS: Custom Hardware Instruction Processor Synthesis
This paper describes an integer-linear-programming (ILP)-based system called Custom Hardware Instruction Processor Synthesis (CHIPS) that identifies custom instructions for critica...
Kubilay Atasu, Can C. Özturan, Günhan D&...
TCAD
2008
124views more  TCAD 2008»
14 years 11 months ago
An Anytime Algorithm for Generalized Symmetry Detection in ROBDDs
Detecting symmetries has many applications in logic synthesis that include, amongst other things, technology mapping, deciding equivalence of Boolean functions when the input corre...
Neil Kettle, Andy King
TKDE
2008
177views more  TKDE 2008»
14 years 10 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
JDWM
2007
122views more  JDWM 2007»
14 years 10 months ago
A Hyper-Heuristic for Descriptive Rule Induction
Rule induction from examples is a machine learning technique that finds rules of the form condition → class, where condition and class are logic expressions of the form variable...
Tho Hoan Pham, Tu Bao Ho