Results 1  10
of
3,278,712
wellknown
"... rubrum (Linné, 1758), belonging to the ordo Gorgonacea, is probably the most ..."
Abstract
 Add to MetaCart
rubrum (Linné, 1758), belonging to the ordo Gorgonacea, is probably the most
The StructureMapping Engine: Algorithm and Examples
 Artificial Intelligence
, 1989
"... This paper describes the StructureMapping Engine (SME), a program for studying analogical processing. SME has been built to explore Gentner's Structuremapping theory of analogy, and provides a "tool kit" for constructing matching algorithms consistent with this theory. Its flexibili ..."
Abstract

Cited by 512 (115 self)
 Add to MetaCart
flexibility enhances cognitive simulation studies by simplifying experimentation. Furthermore, SME is very efficient, making it a useful component in machine learning systems as well. We review the Structuremapping theory and describe the design of the engine. We analyze the complexity of the algorithm
The wellknown Lucas formula
, 1997
"... connects the Fibonacci numbers with binomial coefficients. Our interest is to find out what kind of numbers are obtained by taking every number r in (1) from a fixed residue class modulo m (m = 2,3,...). As a result, a new family of sequences is introduced: the partial, or 1/mFibonacci numbers. We ..."
Abstract
 Add to MetaCart
connects the Fibonacci numbers with binomial coefficients. Our interest is to find out what kind of numbers are obtained by taking every number r in (1) from a fixed residue class modulo m (m = 2,3,...). As a result, a new family of sequences is introduced: the partial, or 1/mFibonacci numbers. We give here a primary description of these numbers and their generating functions. By
The wellknown formula:
"... Thermal verification of complex ICs can help the designer to detect if a particular block is working beyond specifications. A simple method is to extract the output frequencies of an array of ringoscillators previously distributed in the die. The main advantage is that neither external transducers ..."
Abstract
 Add to MetaCart
Thermal verification of complex ICs can help the designer to detect if a particular block is working beyond specifications. A simple method is to extract the output frequencies of an array of ringoscillators previously distributed in the die. The main advantage is that neither external transducers nor analog parts are necessary. Other possibility is to bias one of the clamping diodes usually present in the pads, and measure its junction forward voltage. In both cases, the measurement of temperature can be done in actual working conditions; that is, with the
Survey on Independent Component Analysis
 NEURAL COMPUTING SURVEYS
, 1999
"... A common problem encountered in such disciplines as statistics, data analysis, signal processing, and neural network research, is nding a suitable representation of multivariate data. For computational and conceptual simplicity, such a representation is often sought as a linear transformation of the ..."
Abstract

Cited by 2241 (104 self)
 Add to MetaCart
of the original data. Wellknown linear transformation methods include, for example, principal component analysis, factor analysis, and projection pursuit. A recently developed linear transformation method is independent component analysis (ICA), in which the desired representation is the one that minimizes
A data locality optimizing algorithm
, 1991
"... 1 Introduction As processor speed continues to increase faster than memory speed, optimizations to use the memory hierarchy efficiently become ever more important. Blocking [9] ortiling [18] is a wellknown technique that improves the data locality of numerical algorithms [1, 6, 7, 12, 13].Tiling c ..."
Abstract

Cited by 805 (16 self)
 Add to MetaCart
1 Introduction As processor speed continues to increase faster than memory speed, optimizations to use the memory hierarchy efficiently become ever more important. Blocking [9] ortiling [18] is a wellknown technique that improves the data locality of numerical algorithms [1, 6, 7, 12, 13].Tiling
UMLsec: Extending UML for Secure Systems Development
, 2002
"... Developing securecritical systems is difficult and there are many wellknown examples of security weaknesses exploited in practice. Thus a sound methodology... ..."
Abstract

Cited by 142 (10 self)
 Add to MetaCart
Developing securecritical systems is difficult and there are many wellknown examples of security weaknesses exploited in practice. Thus a sound methodology...
N Degrees of Separation: MultiDimensional Separation of Concerns
 IN PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING
, 1999
"... Done well, separation of concerns can provide many software engineering benefits, including reduced complexity, improved reusability, and simpler evolution. The choice of boundaries for separate concerns depends on both requirements on the system and on the kind(s) of decompositionand composition a ..."
Abstract

Cited by 514 (8 self)
 Add to MetaCart
given formalism supports. The predominant methodologies and formalisms available, however, support only orthogonal separations of concerns, along single dimensions of composition and decomposition. These characteristics lead to a number of wellknown and difficult problems. This paper describes a new
Results 1  10
of
3,278,712