Sciweavers

284 search results - page 51 / 57
» Modularity of Completeness Revisited
Sort
View
IANDC
2011
119views more  IANDC 2011»
13 years 3 months ago
Quantitative Kleene coalgebras
We present a systematic way to generate (1) languages of (generalised) regular expressions, and (2) sound and complete axiomatizations thereof, for a wide variety of quantitative ...
Alexandra Silva, Filippo Bonchi, Marcello M. Bonsa...
INTERSPEECH
2010
13 years 3 months ago
Combining user intention and error modeling for statistical dialog simulators
Statistical user simulation is an efficient and effective way to train and evaluate the performance of a (spoken) dialog system. In this paper, we design and evaluate a modular da...
Silvia Quarteroni, Meritxell González, Gius...
ICRA
2007
IEEE
524views Robotics» more  ICRA 2007»
14 years 2 months ago
Concept and Design of A Fully Autonomous Sewer Pipe Inspection Mobile Robot "KANTARO"
— In current conventional method, the sewer pipe inspection is undertaken using a cable-tethered robot with an on-board video camera system, completely, tele-operated by human op...
Amir Ali Forough Nassiraei, Yoshinori Kawamura, Al...
ICDCS
2003
IEEE
14 years 1 months ago
Enhancing The Fault-Tolerance of Nonmasking Programs
In this paper, we focus on automated techniques to enhance the fault-tolerance of a nonmasking fault-tolerant program to masking. A masking program continually satisfies its spec...
Sandeep S. Kulkarni, Ali Ebnenasir
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
14 years 1 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...