Sciweavers

175 search results - page 23 / 35
» Functional Dependency for Verification Reduction
Sort
View
ISSS
1999
IEEE
157views Hardware» more  ISSS 1999»
14 years 6 days ago
Bit-Width Selection for Data-Path Implementations
Specifications of data computations may not necessarily describe the ranges of the intermediate results that can be generated. However, such information is critical to determine t...
Carlos Carreras, Juan A. López, Octavio Nie...
TASLP
2002
93views more  TASLP 2002»
13 years 7 months ago
Robust endpoint detection and energy normalization for real-time speech and speaker recognition
When automatic speech recognition (ASR) and speaker verification (SV) are applied in adverse acoustic environments, endpoint detection and energy normalization can be crucial to th...
Qi Li, Jinsong Zheng, A. Tsai, Qiru Zhou
TSP
2010
13 years 2 months ago
Welch method revisited: nonparametric power spectrum estimation via circular overlap
The objective of this paper is twofold. The first part provides further insight in the statistical properties of the Welch power spectrum estimator. A major drawback of the Welch m...
Kurt Barbé, Rik Pintelon, Johan Schoukens
JFP
2008
135views more  JFP 2008»
13 years 7 months ago
Hoare type theory, polymorphism and separation
We consider the problem of reconciling a dependently typed functional language with imperative features such as mutable higher-order state, pointer aliasing, and non-termination. ...
Aleksandar Nanevski, J. Gregory Morrisett, Lars Bi...
TDSC
2010
172views more  TDSC 2010»
13 years 2 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...