Results 231 to 240 of about 549,692 (299)
MirathQA: A dataset for evaluating large language models on Hanbali Islamic inheritance reasoning tasks. [PDF]
Almasoud A +4 more
europepmc +1 more source
Errors are robustly tamed in cumulative knowledge processes. [PDF]
Brandenberger A +3 more
europepmc +1 more source
Formal verification of safety properties of epoch processing in Beacon Chain. [PDF]
Rashid M, Rasool I, Afzaal H, Zafar NA.
europepmc +1 more source
A fully automated drilling machine for printed circuit boards with superior path optimization. [PDF]
Mamdouh M +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Calibration with Many Checking Rules
Mathematics of Operations Research, 2003Each period an outcome (out of finitely many possibilities) is observed. For simplicity assume two possible outcomes, a and b. Each period, a forecaster announces the probability of a occurring next period based on the past. Consider an arbitrary subsequence of periods (e.g., odd periods, even periods, all periods in which b is observed, etc.). Given
Sandroni, Alvaro +2 more
openaire +2 more sources
Rule-based testability rule check program
Proceedings., 1990 IEEE International Conference on Computer Design: VLSI in Computers and Processors, 2002A practical rule-based testability rule checker for VLSI testing adopting a tunable rule-base shell suited for rule checking is described. The checking process is divided into symbolic simulation and violation detection. The testability rules applied in the violation detection and the circuit primitive operation rules applied in the symbolic simulator ...
Y. Koseko +3 more
openaire +1 more source
Checking Sets of Pure Evolving Association Rules
Fundamenta Informaticae, 2021Extracting association rules from large datasets has been widely studied in many variants in the last two decades; they allow to extract relations between values that occur more “often” in a database. With temporal association rules the concept has been declined to temporal databases.
Combi, Carlo, Rizzi, Romeo, Sala, Pietro
openaire +3 more sources
Check out the Rules: Towards Time-Efficient Rule Checking over RFID Tags
Mobile Networks and Applications, 2014With the rapid proliferation of RFID technologies, RFID has been introduced to the applications like safety inspection and warehouse management. Conventionally a number of deployment rules are specified for these applications. This paper studies a practically important problem of rule checking over RFID tags, i.e., checking whether the specified rules ...
Yafeng Yin +3 more
openaire +1 more source

