Sciweavers

1466 search results - page 168 / 294
» Completeness of the Authentication Tests
Sort
View
TCAD
2008
103views more  TCAD 2008»
13 years 7 months ago
Using Transfer-Resource Graph for Software-Based Verification of System-on-Chip
The verification of a system-on-chip is challenging due to its high level of integration. Multiple components in a system can behave concurrently and compete for resources. Hence, ...
Xiaoxi Xu, Cheng-Chew Lim
AUTOMATICA
2002
81views more  AUTOMATICA 2002»
13 years 7 months ago
A convex approach to the characterization of the frequency response of ellipsoidal plants
This paper deals with the frequency domain properties of an ellipsoidal family of rational functions, i.e. a family of rational functions whose coefficients depend affinely on an ...
Graziano Chesi, Andrea Garulli, Alberto Tesi, Anto...
IJON
2000
71views more  IJON 2000»
13 years 7 months ago
Variable selection using neural-network models
In this paper we propose an approach to variable selection that uses a neural-network model as the tool to determine which variables are to be discarded. The method performs a bac...
Giovanna Castellano, Anna Maria Fanelli
CSL
1999
Springer
13 years 7 months ago
A hidden Markov-model-based trainable speech synthesizer
This paper presents a new approach to speech synthesis in which a set of cross-word decision-tree state-clustered context-dependent hidden Markov models are used to define a set o...
R. E. Donovan, Philip C. Woodland
JMLR
2002
78views more  JMLR 2002»
13 years 7 months ago
Shallow Parsing using Specialized HMMs
We present a unified technique to solve different shallow parsing tasks as a tagging problem using a Hidden Markov Model-based approach (HMM). This technique consists of the incor...
Antonio Molina, Ferran Pla