Results 31 to 40 of about 4,197,782 (360)
An approach to the verification of high-resolution ocean models using spatial methods [PDF]
The Met Office currently runs two operational ocean forecasting configurations for the North West European Shelf: an eddy-permitting model with a resolution of 7 km (AMM7) and an eddy-resolving model at 1.5 km (AMM15).
R. Crocker+4 more
doaj +1 more source
NormFace: L2 Hypersphere Embedding for Face Verification [PDF]
Thanks to the recent developments of Convolutional Neural Networks, the performance of face verification methods has increased rapidly. In a typical face verification method, feature normalization is a critical step for boosting performance.
Feng Wang+3 more
semanticscholar +1 more source
Exploring wav2vec 2.0 on speaker verification and language identification [PDF]
Wav2vec 2.0 is a recently proposed self-supervised framework for speech representation learning. It follows a two-stage training process of pre-training and fine-tuning, and performs well in speech recognition tasks especially ultra-low resource cases ...
Zhiyun Fan, Meng Li, Shiyu Zhou, Bo Xu
semanticscholar +1 more source
Interrupt Verification via Thread Verification
AbstractMost of the research effort towards verification of concurrent software has focused on multithreaded code. On the other hand, concurrency in low-end embedded systems is predominantly based on interrupts. Low-end embedded systems are ubiquitous in safety-critical applications such as those supporting transportation and medical automation; their ...
Nathan Cooprider, John Regehr
openaire +1 more source
Confluence for process verification [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Groote, J.F., Sellink, M.P.A.
openaire +4 more sources
ObjectiveTo report the morphologic characteristics of tumor-related vasculatures and their association with secondary choroidal neovascularization (CNV), subretinal fluid (SRF), choroidal thickness, retinal pigment epithelium (RPE) alterations ...
Nan Zhou+4 more
doaj +1 more source
On minimising the maximum expected verification time [PDF]
Cyber Physical Systems (CPSs) consist of hardware and software components. To verify that the whole (i.e., software + hardware) system meets the given specifications, exhaustive simulation-based approaches (Hardware In the Loop Simulation, HILS) can be ...
Mancini, Toni+5 more
core +1 more source
Games with recurring certainty [PDF]
Infinite games where several players seek to coordinate under imperfect information are known to be intractable, unless the information flow is severely restricted.
Dietmar Berwanger, Anup Basil Mathew
doaj +1 more source
Verifying the Verifier: eBPF Range Analysis Verification
. This paper proposes an automated method to check the correctness of range analysis used in the Linux kernel’s eBPF verifier. We provide the specification of soundness for range analysis performed by the eBPF verifier. We automatically generate verification
Harishankar Vishwanathan+3 more
semanticscholar +1 more source
NNV: The Neural Network Verification Tool for Deep Neural Networks and Learning-Enabled Cyber-Physical Systems [PDF]
This paper presents the Neural Network Verification (NNV) software tool, a set-based verification framework for deep neural networks (DNNs) and learning-enabled cyber-physical systems (CPS). The crux of NNV is a collection of reachability algorithms that
Hoang-Dung Tran+7 more
semanticscholar +1 more source