Sciweavers

2109 search results - page 384 / 422
» Solving Necklace Constraint Problems
Sort
View
ITC
1998
IEEE
114views Hardware» more  ITC 1998»
14 years 3 months ago
BETSY: synthesizing circuits for a specified BIST environment
This paper presents a logic synthesis tool called BETSY (BIST Environment Testable Synthesis) for synthesizing circuits that achieve complete (100%)fault coverage in a user specif...
Zhe Zhao, Bahram Pouya, Nur A. Touba
KDD
1998
ACM
136views Data Mining» more  KDD 1998»
14 years 3 months ago
Integrating Classification and Association Rule Mining
Classification rule mining aims to discover a small set of rules in the database that forms an accurate classifier. Association rule mining finds all the rules existing in the dat...
Bing Liu, Wynne Hsu, Yiming Ma
AADEBUG
1997
Springer
14 years 3 months ago
Bisection Debugging
This paper introduces the bisection debugging model. The key idea is to use a debugger to identify the semantic differences between two versions of the same program. The debugger ...
Thomas R. Gross
AGP
1996
IEEE
14 years 3 months ago
Modular Analysis of Suspension Free cc Programs
Compositional semantics allow to reason about programs in an incremental way, thus providing the formal base for the development of modular data-flow analyses. The major drawback ...
Enea Zaffanella
ECP
1997
Springer
92views Robotics» more  ECP 1997»
14 years 3 months ago
Understanding and Extending Graphplan
We provide a reconstruction of Blum and Furst’s Graphplan algorithm, and use the reconstruction to extend and improve the original algorithm in several ways. In our reconstructi...
Subbarao Kambhampati, Eric Parker, Eric Lambrecht