Sciweavers

16216 search results - page 4 / 3244
» Effective Modeling with Constraints
Sort
View
CADE
2005
Springer
15 years 9 months ago
Deduction with XOR Constraints in Security API Modelling
We introduce XOR constraints, and show how they enable a theorem prover to reason effectively about security critical subsystems which employ bitwise XOR. Our primary case study is...
Graham Steel
ICASSP
2010
IEEE
14 years 9 months ago
Word confidence calibration using a maximum entropy model with constraints on confidence and word distributions
It is widely known that the quality of confidence measure is critical for speech applications. In this paper, we present our recent work on improving word confidence scores by cal...
Dong Yu, Shizhen Wang, Jinyu Li, Li Deng
WSC
1998
14 years 10 months ago
Effective Implementation of Cycle Time Reduction Strategies for Semiconductor Back-end Manufacturing
Using discrete-event simulation models, a study was conducted to evaluate the current production practices of a high-volume semiconductor back-end operation. The overall goal was ...
Joerg Domaschke, Steven Brown, Jennifer Robinson, ...
CSFW
2006
IEEE
15 years 1 months ago
Types and Effects for Secure Service Orchestration
A distributed calculus is proposed for describing networks of services. We model service interaction through a call-by-property invocation mechanism, by specifying the security co...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
ICRA
2007
IEEE
130views Robotics» more  ICRA 2007»
15 years 3 months ago
The Cost of Reality: Effects of Real-World Factors on Multi-Robot Search
— Designing algorithms for multi-robot systems can be a complex and difficult process: the cost of such systems can be very high, collecting experimental data can be timeconsumi...
Jim Pugh, Alcherio Martinoli