Abstract—Assume-guarantee (AG) reasoning is a compositional verification method where a verification task involving many processes is broken into multiple verification tasks i...
Antti Tapani Siirtola, Stavros Tripakis, Keijo Hel...
Abstract—Multi-processor systems-on-chips are widely adopted in implementing modern streaming applications to satisfy the ever increasing computing requirements. Predictable memo...
Qi Tang, Twan Basten, Marc Geilen, Sander Stuijk, ...
In this paper, we first describe a simplified scenario observed in mining operations, where trucks are loaded and emptied at different locations. We will then look at ways that...
Recently there has been an increased demand for natural language processing tools that work well on unstructured and noisy texts such as texts from Twitter messages. It has been s...
Moving clusters represent groups of objects that move together, for instance, groups of people evacuating a building. However, because moving clusters are composed of lists of clu...
The data of interest are assumed to be represented as Ndimensional real vectors, and these vectors are compressible in some linear basis B, implying that the signals can be recons...
Protecting software copyright has been an issue since the late 1970’s, and software license validation has been a primary method employed in an attempt to minimise software pira...
In this paper, we introduce a new method of data transformation for finger vein recognition system. Our proposed method uses kernel mapping functions to map the data before perfor...
Traditional static topic models mainly focus on the statistical correlation between words, but ignore the sentiment tendency and the temporal properties which may have great effec...
Xi Ding, Lan-Shan Zhang, Ye Tian, Xiangyang Gong, ...