Sciweavers

59 search results - page 9 / 12
» Applying Formal Methods for Human Error Tolerant Design
Sort
View
ICRA
2009
IEEE
137views Robotics» more  ICRA 2009»
14 years 2 months ago
Continuous vocal imitation with self-organized vowel spaces in Recurrent Neural Network
Abstract— A continuous vocal imitation system was developed using a computational model that explains the process of phoneme acquisition by infants. Human infants perceive speech...
Hisashi Kanda, Tetsuya Ogata, Toru Takahashi, Kazu...
IROS
2008
IEEE
161views Robotics» more  IROS 2008»
14 years 1 months ago
Segmenting acoustic signal with articulatory movement using Recurrent Neural Network for phoneme acquisition
— This paper proposes a computational model for phoneme acquisition by infants. Human infants perceive speech sounds not as discrete phoneme sequences but as continuous acoustic ...
Hisashi Kanda, Tetsuya Ogata, Kazunori Komatani, H...
SAFECOMP
1998
Springer
13 years 11 months ago
An Agenda for Specifying Software Components with Complex Data Models
Abstract. We present a method to specify software for a special kind of safetycritical embedded systems, where sensors deliver low-level values that must be abstracted and pre-proc...
Kirsten Winter, Thomas Santen, Maritta Heisel
FAST
2008
13 years 9 months ago
Parity Lost and Parity Regained
RAID storage systems protect data from storage errors, such as data corruption, using a set of one or more integrity techniques, such as checksums. The exact protection offered by...
Andrew Krioukov, Lakshmi N. Bairavasundaram, Garth...
SAC
2004
ACM
14 years 25 days ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...