Sciweavers

106 search results - page 7 / 22
» The power of indirect ties
Sort
View
DATE
2006
IEEE
96views Hardware» more  DATE 2006»
15 years 3 months ago
A methodology for FPGA to structured-ASIC synthesis and verification
Structured-ASIC design provides a mid-way point between FPGA and cell-based ASIC design for performance, area and power, but suffers from the same increasing verification burden a...
Michael Hutton, Richard Yuan, Jay Schleicher, Greg...
VL
2003
IEEE
139views Visual Languages» more  VL 2003»
15 years 2 months ago
Strategies and behaviors of end-user programmers with interactive fault localization
End-user programmers are writing an unprecedented number of programs, due in large part to the significant effort put forth to bring programming power to end users. Unfortunately,...
Shrinu Prabhakararao, Curtis R. Cook, Joseph R. Ru...
AAAI
1998
14 years 11 months ago
A Non-Deterministic Semantics for Tractable Inference
Unit resolution is arguably the most useful known algorithm for tractable reasoning in propositional logic. Intuitively, if one knows a, b, and a b c, then c should be an obviou...
James M. Crawford, David W. Etherington
IJCAI
1997
14 years 11 months ago
Remote-Brained Robots
We introduce our research approach to investigating real world intelligence by building 'Remote-Brained Robots'. The key idea is that of interfacing AI systems with real...
Masayuki Inaba
NDSS
2003
IEEE
15 years 2 months ago
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide variety of security tools have been developed that use t...
Tal Garfinkel