Sciweavers

2555 search results - page 375 / 511
» Quantifiers and Working Memory
Sort
View
KDD
2002
ACM
171views Data Mining» more  KDD 2002»
16 years 4 months ago
Mining complex models from arbitrarily large databases in constant time
In this paper we propose a scaling-up method that is applicable to essentially any induction algorithm based on discrete search. The result of applying the method to an algorithm ...
Geoff Hulten, Pedro Domingos
CHI
2006
ACM
16 years 4 months ago
Generating automated predictions of behavior strategically adapted to specific performance objectives
It has been well established in Cognitive Psychology that humans are able to strategically adapt performance, even highly skilled performance, to meet explicit task goals such as ...
Katherine Eng, Richard L. Lewis, Irene Tollinger, ...
CHI
2006
ACM
16 years 4 months ago
Virtual information piles for small screen devices
We describe an implementation that has users `flick' notes, images, audio, and video files onto virtual piles beyond the display of small-screen devices. This scheme allows P...
QianYing Wang, Tony Hsieh, Meredith Ringel Morris,...
VLSID
2007
IEEE
130views VLSI» more  VLSID 2007»
16 years 4 months ago
Impact of NBTI on FPGAs
Device scaling such as reduced oxide thickness and high electric field has given rise to various reliability concerns. One such growing issue of concern is the degradation of PMOS...
Krishnan Ramakrishnan, S. Suresh, Narayanan Vijayk...
VLSID
2006
IEEE
121views VLSI» more  VLSID 2006»
16 years 4 months ago
An Integrated Approach for Combining BDD and SAT Provers
Many formal verification tools today are based on Boolean proof techniques. The two most powerful approaches in this context are Binary Decision Diagrams (BDDs) and methods based ...
Rolf Drechsler, Görschwin Fey, Sebastian Kind...