Sciweavers

107 search results - page 12 / 22
» Experiences during the Experimental Validation of the Time-T...
Sort
View
DAC
1999
ACM
14 years 8 months ago
Optimization-Intensive Watermarking Techniques for Decision Problems
Recently, a number of watermarking-based intellectual property protection techniques have been proposed. Although they have been applied to different stages in the design process ...
Gang Qu, Jennifer L. Wong, Miodrag Potkonjak
SIMUTOOLS
2008
13 years 9 months ago
Implementing MAC protocols for cooperative relaying: a compiler-assisted approach
Evaluating the performance of a cooperative relaying protocol requires an implementation for simulators and/or software-defined radios (SDRs) with an appropriate model for error d...
Hermann S. Lichte, Stefan Valentin
IJCNN
2008
IEEE
14 years 2 months ago
Numerical condition of feedforward networks with opposite transfer functions
— Numerical condition affects the learning speed and accuracy of most artificial neural network learning algorithms. In this paper, we examine the influence of opposite transfe...
Mario Ventresca, Hamid R. Tizhoosh
IAT
2010
IEEE
13 years 5 months ago
Learning Personal Agents with Adaptive Player Modeling in Virtual Worlds
Abstract--There has been growing interest in creating intelligent agents in virtual worlds that do not follow fixed scripts predefined by the developers, but react accordingly base...
Yilin Kang, Ah-Hwee Tan
DAC
2008
ACM
14 years 8 months ago
On reliable modular testing with vulnerable test access mechanisms
In modular testing of system-on-a-chip (SoC), test access mechanisms (TAMs) are used to transport test data between the input/output pins of the SoC and the cores under test. Prio...
Lin Huang, Feng Yuan, Qiang Xu