Sciweavers

2225 search results - page 369 / 445
» Logical Structures in the Lexicon
Sort
View
DFT
2007
IEEE
135views VLSI» more  DFT 2007»
14 years 2 months ago
Fault Secure Encoder and Decoder for Memory Applications
We introduce a reliable memory system that can tolerate multiple transient errors in the memory words as well as transient errors in the encoder and decoder (corrector) circuitry....
Helia Naeimi, André DeHon
FUZZIEEE
2007
IEEE
14 years 2 months ago
Single Pass Fuzzy C Means
— Recently several algorithms for clustering large data sets or streaming data sets have been proposed. Most of them address the crisp case of clustering, which cannot be easily ...
Prodip Hore, Lawrence O. Hall, Dmitry B. Goldgof
FUZZIEEE
2007
IEEE
14 years 2 months ago
Fuzzy Approximation for Convergent Model-Based Reinforcement Learning
— Reinforcement learning (RL) is a learning control paradigm that provides well-understood algorithms with good convergence and consistency properties. Unfortunately, these algor...
Lucian Busoniu, Damien Ernst, Bart De Schutter, Ro...
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
14 years 2 months ago
Decision Support in Health Care via Root Evidence Sampling
— Bayesian networks play a key role in decision support within health care. Physicians rely on Bayesian networks to give medical treatment, generate what-if scenarios, and other ...
Benjamin B. Perry, Eli Faulkner
ICDCSW
2007
IEEE
14 years 2 months ago
UBCA: Utility-Based Clustering Architecture for Peer-to-Peer Systems
Peer-to-Peer (P2P) systems are currently used in a variety of applications. File sharing applications and ad hoc networking have fueled the usage of these systems. P2P systems gen...
Brent Lagesse, Mohan Kumar