Sciweavers

1536 search results - page 102 / 308
» The Underlying Logic of Hoare Logic
Sort
View
ITC
1995
IEEE
104views Hardware» more  ITC 1995»
15 years 1 months ago
Synthesis of Mapping Logic for Generating Transformed Pseudo-Random Patterns for BIST
During built-in self-test (BIST), the set of patterns generated by a pseudo-random pattern generator may not provide a sufficiently high fault coverage. This paper presents a new ...
Nur A. Touba, Edward J. McCluskey
ISSA
2008
14 years 11 months ago
Application of Message Digests for the Verification of Logical Forensic Data
A message digest is a fixed length output produced by applying a cryptographic algorithm on input binary data of arbitrary length. If the input data changes even by one bit, the g...
Pontjho Mokhonoana, Martin S. Olivier
JCP
2008
124views more  JCP 2008»
14 years 10 months ago
Novel Fuzzy Logic Controllers with Self-Tuning Capability
Two controllers which extend the PD+I fuzzy logic controller to deal with the plant having time varying nonlinear dynamics are proposed. The adaptation ability of the first self tu...
Fong Chwee Teng, Ahmad Lotfi, Ah Chung Tsoi
JASIS
2000
120views more  JASIS 2000»
14 years 9 months ago
Probabilistic datalog: Implementing logical information retrieval for advanced applications
In the logical approach to information retrieval (IR), retrieval is considered as uncertain inference. Whereas classical IR models are based on propositional logic, we combine Dat...
Norbert Fuhr
LOGCOM
2002
142views more  LOGCOM 2002»
14 years 9 months ago
Two Logical Theories of Plan Recognition
We present a logical approach to plan recognition that builds on Kautz's theory of keyhole plan recognition, defined as the problem of inferring descriptions of high-level pl...
Wayne Wobcke