Sciweavers

2584 search results - page 85 / 517
» On the Forward Checking Algorithm
Sort
View
ICPR
2008
IEEE
14 years 2 months ago
A new courtesy amount recognition module of a Check Reading System
A new courtesy amount recognition module of CENPARMI’s Check Reading System (CRS) is proposed in this paper. The module consists of 3 main segments: pre-processing, segmentation...
Wu Ding, Ching Y. Suen, Adam Krzyzak
DAC
2006
ACM
14 years 2 months ago
Mining global constraints for improving bounded sequential equivalence checking
In this paper, we propose a novel technique on mining relationships in a sequential circuit to discover global constraints. In contrast to the traditional learning methods, our mi...
Weixin Wu, Michael S. Hsiao
VLDB
2005
ACM
114views Database» more  VLDB 2005»
14 years 1 months ago
Checking for k-Anonymity Violation by Views
When a private relational table is published using views, secrecy or privacy may be violated. This paper uses a formally-defined notion of k-anonymity to measure disclosure by vi...
Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia
CAV
2004
Springer
121views Hardware» more  CAV 2004»
13 years 11 months ago
CirCUs: A Satisfiability Solver Geared towards Bounded Model Checking
Abstract. CirCUs is a satisfiability solver that works on a combination of AndInverter-Graph, CNF clauses, and BDDs. It has been designed to work well with bounded model checking. ...
HoonSang Jin, Mohammad Awedh, Fabio Somenzi
DEXAW
2004
IEEE
132views Database» more  DEXAW 2004»
13 years 11 months ago
Using Data-Flow Analysis for Resilience and Result Checking in Peer-To-Peer Computations
To achieve correct execution of peer-to-peer applications on non-reliable resources, we present a portable and distributed algorithm that provides fault tolerance and result checki...
Samir Jafar, Sébastien Varrette, Jean-Louis...