Sciweavers

6624 search results - page 220 / 1325
» Design Pattern Recognition
Sort
View
ICDM
2010
IEEE
217views Data Mining» more  ICDM 2010»
13 years 7 months ago
Discovering Temporal Features and Relations of Activity Patterns
An important problem that arises during the data mining process in many new emerging application domains is mining data with temporal dependencies. One such application domain is a...
Ehsan Nazerfard, Parisa Rashidi, Diane J. Cook
EURODAC
1994
IEEE
105views VHDL» more  EURODAC 1994»
14 years 1 months ago
On Design Rule Correct Maze Routing
This paper addresses the problem of design rule correct routing, i.e. the avoidance of illegal wiring patterns during routing. These illegal wiring patterns are due to the set of ...
Ed P. Huijbregts, Jos T. J. van Eijndhoven, Jochen...
ECOOPW
1999
Springer
14 years 1 months ago
Correct Composition of Design Components
In this paper, we describe a method for the composition of components that are relatively correct under a particular criterion. The notion of composition pattern is also introduce...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
VLSID
2003
IEEE
96views VLSI» more  VLSID 2003»
14 years 10 months ago
Design Of A Universal BIST (UBIST) Structure
This paper introduces a Built-In Self Test (BIST) structure referred to as Universal BIST (UBIST). The Test Pattern Generator (TPG) of the proposed UBIST is designed to generate an...
Sukanta Das, Niloy Ganguly, Biplab K. Sikdar, Pari...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
14 years 1 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...