Sciweavers

670 search results - page 74 / 134
» Real Time Model Checking Using Timed Concurrent State Machin...
Sort
View
TACAS
2010
Springer
221views Algorithms» more  TACAS 2010»
14 years 2 months ago
Trace-Based Symbolic Analysis for Atomicity Violations
Abstract. We propose a symbolic algorithm to accurately predict atomicity violations by analyzing a concrete execution trace of a concurrent program. We use both the execution trac...
Chao Wang, Rhishikesh Limaye, Malay K. Ganai, Aart...
CHES
2008
Springer
84views Cryptology» more  CHES 2008»
13 years 9 months ago
A Real-World Attack Breaking A5/1 within Hours
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Timo Gendrullis, Martin Novotný, Andy Rupp
INTERSPEECH
2010
13 years 2 months ago
FSM-based pronunciation modeling using articulatory phonological code
According to articulatory phonology, the gestural score is an invariant speech representation. Though the timing schemes, i.e., the onsets and offsets, of the gestural activations...
Chi Hu, Xiaodan Zhuang, Mark Hasegawa-Johnson
ICML
2008
IEEE
14 years 8 months ago
Beam sampling for the infinite hidden Markov model
The infinite hidden Markov model is a nonparametric extension of the widely used hidden Markov model. Our paper introduces a new inference algorithm for the infinite Hidden Markov...
Jurgen Van Gael, Yunus Saatci, Yee Whye Teh, Zoubi...
DATE
2010
IEEE
183views Hardware» more  DATE 2010»
13 years 6 months ago
Toward optimized code generation through model-based optimization
—Model-Based Development (MBD) provides an al level of abstraction, the model, which lets engineers focus on the business aspect of the developed system. MBD permits automatic tr...
Asma Charfi, Chokri Mraidha, Sébastien G&ea...