Results 31 to 40 of about 268,099 (291)

GPU-TLS: an efficient runtime for speculative loop parallelization on GPUs [PDF]

open access: yes, 2013
Recently GPUs have risen as one important parallel platform for general purpose applications, both in HPC and cloud environments. Due to the special execution model, developing programs for GPUs is difficult even with the recent introduction of high ...
Han, G, Wang, CL, Zhang, C
core   +1 more source

Efficient Loop Conditions for Bounded Model Checking Hyperproperties

open access: yes, 2023
AbstractBounded model checking (BMC) is an effective technique for hunting bugs by incrementally exploring the state space of a system. To reason about infinite traces through a finite structure and to ultimately obtain completeness, BMC incorporates loop conditions that revisit previously observed states.
Tzu-Han Hsu   +3 more
openaire   +2 more sources

Automated Synthesis of Safe Digital Controllers for Sampled-Data Stochastic Nonlinear Systems

open access: yesIEEE Access, 2020
We present a new method for the automated synthesis of digital controllers with formal safety guarantees for systems with nonlinear dynamics, noisy output measurements, and stochastic disturbances.
Fedor Shmarov   +6 more
doaj   +1 more source

Classification and Quantification of Human Error in Manufacturing: A Case Study in Complex Manual Assembly

open access: yesApplied Sciences, 2021
Manual assembly operations are sensitive to human errors that can diminish the quality of final products. The paper shows an application of human reliability analysis in a realistic manufacturing context to identify where and why manual assembly errors ...
Yaniel Torres   +2 more
doaj   +1 more source

Multi-messenger constraints to the local emission of cosmic-ray electrons [PDF]

open access: yes, 2019
The data on the inclusive flux of cosmic positrons and electrons ($e^++e^{-}$) have been recently collected from GeV to tens of TeV energies by several experiments with unprecedented precision.
Di Mauro, Mattia   +2 more
core   +3 more sources

Using Program Synthesis for Program Analysis [PDF]

open access: yes, 2015
In this paper, we identify a fragment of second-order logic with restricted quantification that is expressive enough to capture numerous static analysis problems (e.g.
David, Cristina   +2 more
core   +4 more sources

Artificial Intelligence in Automated Detection of Disinformation: A Thematic Analysis

open access: yesJournalism and Media, 2023
The increasing prevalence of disinformation has led to a growing interest in leveraging artificial intelligence (AI) for detecting and combating this phenomenon.
Fátima C. Carrilho Santos
doaj   +1 more source

Charge and Magnetic Moment of the Neutrino in the Background Field Method and in the Linear R_xi^L Gauge [PDF]

open access: yes, 1999
We present a computation of the charge and the magnetic moment of the neutrino in the recently developed electro-weak Background Field Method and in the linear $R_{\xi}^L$ gauge.
Bernabeu, J.   +3 more
core   +2 more sources

Modeling Operator Performance in Human-in-the-Loop Autonomous Systems

open access: yesIEEE Access, 2021
With the increasing role of human-in-the-loop (HITL) based autonomous systems, researchers have made several attempts to understand how an operator’s performance is affected by various parameters.
Shahabuddin Muhammad
doaj   +1 more source

Verification of Flat FIFO Systems [PDF]

open access: yesLogical Methods in Computer Science, 2020
The decidability and complexity of reachability problems and model-checking for flat counter machines have been explored in detail. However, only few results are known for flat (lossy) FIFO machines, only in some particular cases (a single loop or a ...
Alain Finkel, M. Praveen
doaj   +1 more source

Home - About - Disclaimer - Privacy