Sciweavers

522 search results - page 53 / 105
» What's a Typical Commit
Sort
View
MTDT
2003
IEEE
164views Hardware» more  MTDT 2003»
14 years 1 months ago
Applying Defect-Based Test to Embedded Memories in a COT Model
ct Defect-based testing for digital logic concentrates primarily on methods of test application, including for example at-speed structural tests and IDDQ testing. In contrast, defe...
Robert C. Aitken
IRFC
2011
Springer
12 years 11 months ago
Applying Web Usage Mining for Adaptive Intranet Navigation
Much progress has recently been made in assisting a user in the search process, be it Web search where the big search engines have now all incorporated more interactive features or...
Sharhida Zawani Saad, Udo Kruschwitz
AAAI
2012
11 years 10 months ago
Dynamic Matching via Weighted Myopia with Application to Kidney Exchange
In many dynamic matching applications—especially high-stakes ones—the competitive ratios of prior-free online algorithms are unacceptably poor. The algorithm should take distr...
John P. Dickerson, Ariel D. Procaccia, Tuomas Sand...
EUROCAST
2007
Springer
182views Hardware» more  EUROCAST 2007»
14 years 1 months ago
A k-NN Based Perception Scheme for Reinforcement Learning
Abstract a paradigm of modern Machine Learning (ML) which uses rewards and punishments to guide the learning process. One of the central ideas of RL is learning by “direct-online...
José Antonio Martin H., Javier de Lope Asia...
IPPS
2006
IEEE
14 years 1 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti