Sciweavers

2006 search results - page 273 / 402
» Systematic Component Adaptation
Sort
View
157
Voted
TACAS
2010
Springer
212views Algorithms» more  TACAS 2010»
15 years 15 days ago
Assume-Guarantee Verification for Probabilistic Systems
Abstract. We present a compositional verification technique for systems that exhibit both probabilistic and nondeterministic behaviour. We adopt an assume-guarantee approach to ver...
Marta Z. Kwiatkowska, Gethin Norman, David Parker,...
136
Voted
JDCTA
2010
203views more  JDCTA 2010»
14 years 9 months ago
Preprocessing Method for NaXi Pictographs Character Recognition Using Wavelet Transform
Preprocessing, a major component of Character Recognition System, has direct effect on the recognition system by its performance. Using wavelet transform, this paper mainly focuse...
Hai Guo, Jing-ying Zhao, Xiao-niu Li
67
Voted
ICASSP
2011
IEEE
14 years 6 months ago
Offending frequency suppression with a reset algorithm to improve feedback cancellation in digital hearing aids
Acoustic feedback limits the gain provided by hearing aids. Digital hearing aids identify acoustic feedback signals and cancel them continuously in a closed loop with an adaptive ...
Ashutosh Pandey, V. John Mathews
161
Voted
ECSA
2011
Springer
14 years 2 months ago
Architecture-Based Run-Time Fault Diagnosis
Abstract. An important step in achieving robustness to run-time faults is the ability to detect and repair problems when they arise in a running system. Effective fault detection a...
Paulo Casanova, Bradley R. Schmerl, David Garlan, ...
144
Voted
IACR
2011
105views more  IACR 2011»
14 years 2 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi