• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 660
Next 10 →

Loopy belief propagation for approximate inference: An empirical study. In:

by Kevin P Murphy , Yair Weiss , Michael I Jordan - Proceedings of Uncertainty in AI, , 1999
"... Abstract Recently, researchers have demonstrated that "loopy belief propagation" -the use of Pearl's polytree algorithm in a Bayesian network with loops -can perform well in the context of error-correcting codes. The most dramatic instance of this is the near Shannon-limit performanc ..."
Abstract - Cited by 676 (15 self) - Add to MetaCart
to work well. In this paper we investigate loopy prop agation empirically under a wider range of conditions. Is there something special about the error-correcting code setting, or does loopy propagation work as an approximation scheme for a wider range of networks? ..\ x(:x).) (1) where: and: The message

Self-Testing/Correcting with Applications to Numerical Problems

by Manuel Blum, Michael Luby, Ronitt Rubinfeld , 1990
"... Suppose someone gives us an extremely fast program P that we can call as a black box to compute a function f . Should we trust that P works correctly? A self-testing/correcting pair allows us to: (1) estimate the probability that P (x) 6= f(x) when x is randomly chosen; (2) on any input x, compute ..."
Abstract - Cited by 361 (27 self) - Add to MetaCart
Suppose someone gives us an extremely fast program P that we can call as a black box to compute a function f . Should we trust that P works correctly? A self-testing/correcting pair allows us to: (1) estimate the probability that P (x) 6= f(x) when x is randomly chosen; (2) on any input x, compute

A Methodology for Correct-by-Construction Latency Insensitive Design

by Luca P. Carloni, Kenneth L. McMillan , Alexander Saldanha, Alberto L. Sangiovanni-Vincentelli - IN PROC. INTL. CONF. ON COMPUTER-AIDED DESIGN , 2003
"... In Deep Sub-Micron (DSM) designs, performance will depend critically on the latency of long wires. We propose a new synthesis methodology for synchronous systems that makes the design functionally insensitive to the latency of long wires. Given a synchronous specification of a design, we generate a ..."
Abstract - Cited by 63 (13 self) - Add to MetaCart
functionally equivalent synchronous implementation that can tolerate arbitrary communication latency between latches. By using latches we can break a long wire in short segments which can be traversed while meeting a single clock cycle constraint. The overall goal is to obtain a design that is robust

The scaling challenge: Can correct-by-construction design help

by Prashant Saxena, Noel Menezes, Pasquale Cocchini, Desmond A. Kirkpatrick - In Proc. ISPD , 2003
"... We present the results of scaling studies in the context of typical block-level wiring distributions, and study the impact of the identified trends on the post-RTL design process. In particular, we look at the implications of exponentially increasing repeater and clocked repeater counts on the algor ..."
Abstract - Cited by 22 (1 self) - Add to MetaCart
meeting CbC philosophy, and then construct a case for flexible, abstract fabrics. Finally, we suggest CbC approaches to tackle the new synthesis and layout challenges identified in this paper.

Whom You Know Matters: Venture Capital Networks and Investment Performance,

by Yael Hochberg , Alexander Ljungqvist , Yang Lu , Steve Drucker , Jan Eberly , Eric Green , Yaniv Grinstein , Josh Lerner , Laura Lindsey , Max Maksimovic , Roni Michaely , Maureen O'hara , Ludo Phalippou Mitch Petersen , Jesper Sorensen , Per Strömberg Morten Sorensen , Yael Hochberg , Johnson - Journal of Finance , 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract - Cited by 138 (8 self) - Add to MetaCart
of funding. Controlling for other known determinants of VC fund performance such as fund size (Kaplan and Schoar When we examine performance at the portfolio company level, we find that a VC's network centrality has a positive and significant effect on the probability that a portfolio company survives

A Verifiable and Correct-by-Construction Controller for Robot Functional Levels

by Saddek Bensalem, Lavindra Silva, Rongjie Yan
"... Abstract—Autonomous robots are complex systems that require the interaction and cooperation between numerous heterogeneous software components. In recent times, robots are being increasingly used for complex and safety-critical tasks, such as exploring Mars and assisting/replacing humans. Consequent ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
. Consequently, robots are becoming critical systems that must meet safety properties, in particular, logical, temporal and real-time constraints. To this end, we present an evolution of the LAAS architecture for autonomous systems, in particular its GenoM tool. This evolution relies on the BIP component

A Methodology for Correct-by-Construction Latency Insensitive Design

by Er Saldanha, Alberto L. Sangiovanni-vincentelli - Iniematio~l Conference on Computer-Aided Drsign,pp. 307-314, 1997 [I I ] Kanishika Lahiri, Anand Raghunathan and Sujit Dey, "Efficient Exploration of the SoC Communication ArchitecNre Design Space." hremrio~l Conference on Computer-Aided Design
"... In Deep Sub-Micron (DSM) designs, performance will depend critically on the latency of long wires. We propose a new synthesis methodology for synchronous systems that makes the design functionally insensitive to the latency of long wires. Given a synchronous specification of a design, we generate a ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
functionally equivalent synchronous implementation that can tolerate arbitrary communication latency between latches. By using latches we can break a long wire in short segments which can be traversed while meeting a single clock cycle constraint. The overall goal is to obtain a design that is robust

Self-concordance at work: Toward understanding the motivational effects of transformational leaders.

by Joyce E Bono , Timothy A Judge - Academy of Management Journal, , 2003
"... We extend existing theories by linking transformational leadership to "self-concordance" at work. In two studies using diverse samples and methods, leader behaviors were associated with follower tendencies to set self-concordant goals. In general, followers of transformational leaders vie ..."
Abstract - Cited by 113 (3 self) - Add to MetaCart
of the latent and observed variables on the intended construct. This model demonstrated a good fit for the data ( 2 ϭ 25.99, df ϭ 14, p ϭ .02, CFI ϭ 1.00, IFI ϭ 1.00, SRMR ϭ .01, RMSEA ϭ .04). In cases in which we used a single observed variable to measure a latent construct (job attitudes), we corrected

Assessing Probability of Correct Ambiguity Resolution in the Presence of Time-Correlated Errors

by Mark Petovello, M. Elizabeth Cannon , 2006
"... ABSTRACT: To meet their accuracy requirements, many applications require the resolution of the carrier phase ambiguities to their integer values. However, the process of ambiguity resolution is ultimately based on statisti-cal values and therefore has an associated probability of being performed cor ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
ABSTRACT: To meet their accuracy requirements, many applications require the resolution of the carrier phase ambiguities to their integer values. However, the process of ambiguity resolution is ultimately based on statisti-cal values and therefore has an associated probability of being performed

X meets Z: Verifying correctness in the presence of POSIX threads

by Bart Massey - In USENIX Annual Technical Conference, FREENIX Track , 2002
"... utilizes an informal analysis and design process coupled with extensive user testing. While this approach is often appropriate, there are situations for which it produces less-than-stellar results. A case study is given of such a situation that arose during the design and implementation of a thread- ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
delicate matter. The problem of ensuring that this complex system is coded correctly can be attacked through the use of lightweight formal methods. A model is constructed of the troublesome portion of the system using the Z formal specification notation. This model is used to establish important system
Next 10 →
Results 1 - 10 of 660
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University