Sciweavers

598 search results - page 20 / 120
» A Deterministic Metaheuristic Approach Using
Sort
View
FAC
2008
64views more  FAC 2008»
13 years 7 months ago
Testing a deterministic implementation against a non-controllable non-deterministic stream X-machine
A stream X-machine is a type of extended finite state machine with an associated development approach that consists of building a system from a set of trusted components. One of th...
Robert M. Hierons, Florentin Ipate
NIPS
2003
13 years 9 months ago
Geometric Clustering Using the Information Bottleneck Method
We argue that K–means and deterministic annealing algorithms for geometric clustering can be derived from the more general Information Bottleneck approach. If we cluster the ide...
Susanne Still, William Bialek, Léon Bottou
DATE
2005
IEEE
125views Hardware» more  DATE 2005»
14 years 1 months ago
Hybrid BIST Based on Repeating Sequences and Cluster Analysis
We present a hybrid BIST approach that extracts the most frequently occurring sequences from deterministic test patterns; these extracted sequences are stored on-chip. We use clus...
Lei Li, Krishnendu Chakrabarty
ICONIP
1998
13 years 9 months ago
An Application of ELISA to Perfect Hashing with Deterministic Ordering
This paper describes a practical application of a novel terminal attractor algorithm to the construction of Perfect Hash Functions (PHF) for a prede ned set of keys. The proposed ...
Monica Bianchini, Stefano Fanelli, Marco Gori
IJSN
2006
65views more  IJSN 2006»
13 years 7 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang