Sciweavers

274 search results - page 35 / 55
» Program Compression
Sort
View
ASPDAC
2006
ACM
109views Hardware» more  ASPDAC 2006»
13 years 11 months ago
Hardware debugging method based on signal transitions and transactions
- This paper proposes a hardware design debugging method, Transition and Transaction Tracer (TTT), which probes and records the signals of interest for a long time, hours, days, or...
Nobuyuki Ohba, Kohji Takano
CP
2008
Springer
13 years 9 months ago
Reformulating Positive Table Constraints Using Functional Dependencies
Constraints that are defined by tables of allowed tuples of assignments are common in constraint programming. In this paper we present an approach to reformulating table constraint...
Hadrien Cambazard, Barry O'Sullivan
CORR
2008
Springer
103views Education» more  CORR 2008»
13 years 7 months ago
"Real" Slepian-Wolf Codes
We provide a novel achievability proof of the Slepian-Wolf theorem for i.i.d. sources over finite alphabets. We demonstrate that random codes that are linear over the real field ac...
Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg
JEI
1998
94views more  JEI 1998»
13 years 7 months ago
Proximity sensing with wavelet-generated video
In this paper we introduce wavelet video processing of proximity sensor signals. Proximity sensing is required for a wide range of military and commercial applications, including w...
Steven Noel, Harold Szu
ACL
1996
13 years 8 months ago
Linguistic Structure as Composition and Perturbation
This paper discusses the problem of learning language from unprocessed text and speech signals, concentrating on the problem of learning a lexicon. In particular, it argues for a ...
Carl de Marcken