Results 31 to 40 of about 4,197,782 (360)

An approach to the verification of high-resolution ocean models using spatial methods [PDF]

open access: yesOcean Science, 2020
The Met Office currently runs two operational ocean forecasting configurations for the North West European Shelf: an eddy-permitting model with a resolution of 7 km (AMM7) and an eddy-resolving model at 1.5 km (AMM15).
R. Crocker   +4 more
doaj   +1 more source

NormFace: L2 Hypersphere Embedding for Face Verification [PDF]

open access: yesACM Multimedia, 2017
Thanks to the recent developments of Convolutional Neural Networks, the performance of face verification methods has increased rapidly. In a typical face verification method, feature normalization is a critical step for boosting performance.
Feng Wang   +3 more
semanticscholar   +1 more source

Exploring wav2vec 2.0 on speaker verification and language identification [PDF]

open access: yesInterspeech, 2020
Wav2vec 2.0 is a recently proposed self-supervised framework for speech representation learning. It follows a two-stage training process of pre-training and fine-tuning, and performs well in speech recognition tasks especially ultra-low resource cases ...
Zhiyun Fan, Meng Li, Shiyu Zhou, Bo Xu
semanticscholar   +1 more source

Interrupt Verification via Thread Verification

open access: yesElectronic Notes in Theoretical Computer Science, 2007
AbstractMost of the research effort towards verification of concurrent software has focused on multithreaded code. On the other hand, concurrency in low-end embedded systems is predominantly based on interrupts. Low-end embedded systems are ubiquitous in safety-critical applications such as those supporting transportation and medical automation; their ...
Nathan Cooprider, John Regehr
openaire   +1 more source

Confluence for process verification [PDF]

open access: yesTheoretical Computer Science, 1995
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Groote, J.F., Sellink, M.P.A.
openaire   +4 more sources

Appearance of Tumor Vessels in Patients With Choroidal Osteoma Using Swept-Source Optical Coherence Tomographic Angiography

open access: yesFrontiers in Oncology, 2021
ObjectiveTo report the morphologic characteristics of tumor-related vasculatures and their association with secondary choroidal neovascularization (CNV), subretinal fluid (SRF), choroidal thickness, retinal pigment epithelium (RPE) alterations ...
Nan Zhou   +4 more
doaj   +1 more source

On minimising the maximum expected verification time [PDF]

open access: yes, 2017
Cyber Physical Systems (CPSs) consist of hardware and software components. To verify that the whole (i.e., software + hardware) system meets the given specifications, exhaustive simulation-based approaches (Hardware In the Loop Simulation, HILS) can be ...
Mancini, Toni   +5 more
core   +1 more source

Games with recurring certainty [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2014
Infinite games where several players seek to coordinate under imperfect information are known to be intractable, unless the information flow is severely restricted.
Dietmar Berwanger, Anup Basil Mathew
doaj   +1 more source

Verifying the Verifier: eBPF Range Analysis Verification

open access: yesInternational Conference on Computer Aided Verification, 2023
. This paper proposes an automated method to check the correctness of range analysis used in the Linux kernel’s eBPF verifier. We provide the specification of soundness for range analysis performed by the eBPF verifier. We automatically generate verification
Harishankar Vishwanathan   +3 more
semanticscholar   +1 more source

NNV: The Neural Network Verification Tool for Deep Neural Networks and Learning-Enabled Cyber-Physical Systems [PDF]

open access: yesInternational Conference on Computer Aided Verification, 2020
This paper presents the Neural Network Verification (NNV) software tool, a set-based verification framework for deep neural networks (DNNs) and learning-enabled cyber-physical systems (CPS). The crux of NNV is a collection of reachability algorithms that
Hoang-Dung Tran   +7 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy