Filters








12,756 Hits in 8.3 sec

A Probabilistic Formal Analysis Approach to Cross Layer Optimization in Distributed Embedded Systems [chapter]

Minyoung Kim, Mark-Oliver Stehr, Carolyn Talcott, Nikil Dutt, Nalini Venkatasubramanian
2007 Lecture Notes in Computer Science  
We present a novel approach, based on probabilistic formal methods, to developing cross-layer resource optimization policies for resource limited distributed systems.  ...  We describe how existing statistical approaches have been adapted and improved to provide analyses of given cross-layered optimization policies with quantifiable confidence.  ...  To leverage our prior effort, we are integrating formal methods with cross-layer optimization in a unified framework.  ... 
doi:10.1007/978-3-540-72952-5_18 fatcat:xmxvxygumfewbnientp4mkj6vu

xTune

Minyoung Kim, Mark-Oliver Stehr, Carolyn Talcott, Nikil Dutt, Nalini Venkatasubramanian
2012 ACM Transactions on Embedded Computing Systems  
Integration of formal analysis with dynamic behavior from system execution results in a feedback loop that enables model refinement and further optimization of policies and parameters.  ...  We demonstrate the applicability of this approach to the adaptive provisioning of resource-limited distributed real-time systems using a mobile multimedia case study.  ...  A Formal Methodology for Cross-Layer Tuning of Mobile Embedded Systems 73:3 bounds for critical performance parameters.  ... 
doi:10.1145/2362336.2362340 fatcat:22rpg3r3i5cp5g5gznxy5vx53m

xTune

Minyoung Kim
2008 ACM SIGBED Review  
In this context, a holistic cross-layer optimization considering multiple layers (e.g., application, middleware, operating system) needs to be developed for continuous adaptation of system parameters.  ...  The integration of formal analysis with dynamic behavior from system execution will result in a feedback loop that enables model refinement and further optimization of policies and parameters.  ...  Our recent study in [5] proposes an iterative tuning approach for DRE (Distributed Real-time Embedded) systems that couples two important facets: i) a light-weight, on-the-fly formal verification, and  ... 
doi:10.1145/1366283.1366307 fatcat:3cksnmaiizhprlvbl6r5ztsg7m

A Formal Methodology for Compositional Cross-Layer Optimization [chapter]

Minyoung Kim, Mark-Oliver Stehr, Carolyn Talcott, Nikil Dutt, Nalini Venkatasubramanian
2011 Lecture Notes in Computer Science  
The formal specification is then analyzed using statistical analysis, to determine the impact of various policies for achieving a variety of end-to-end properties in a quantifiable manner.  ...  The integration of formal analysis with dynamic behavior from system execution results in a feedback loop that enables model refinement and further optimization of policies and parameters.  ...  To analyze the behavior of the system (e.g., in terms of discrete or continuous observable properties) in a probabilistic sense, we have implemented two lightweight formal analysis techniques: statistical  ... 
doi:10.1007/978-3-642-24933-4_10 fatcat:vocrn6zoizcgdfzkscymtz3wfu

State-of-the-art tools and techniques for quantitative modeling and analysis of embedded systems

M. Bozga, A. David, A. Hartmanns, H. Hermanns, K. G. Larsen, A. Legay, J. Tretmans
2012 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE)  
This paper surveys well-established/recent tools and techniques developed for the design of rigorous embedded systems.  ...  The tool uses a symbolic algorithm for solving minimum cost reachability problems, with several applications to optimization for embedded systems, including Worst-Case Execution Times (WCET) analysis  ...  The idea behind MODEST is to provide a single-formalism, multi-solution approach to modelling and analysis: Many wellknown models are subsumed by STA, such as (probabilistic) timed automata ((P)TA, [12  ... 
doi:10.1109/date.2012.6176499 dblp:conf/date/BozgaDHHLLT12 fatcat:jhl5e4fo7neupgnapdhd2eitfa

Efficient optimization of large probabilistic models

Simon Struck, Matthias Güdemann, Frank Ortmeier
2013 Journal of Systems and Software  
We propose an integrated approach for modeling, analysis and optimization of safety critical systems. It is fully automated with an implementation based on the Eclipse platform.  ...  The approach is tool-independent, different analysis tools can be used and there exists an API for the integration of different optimization and estimation algorithms.  ...  Acknowledgement: Simon Struck is funded by the German Research Foundation (DFG) within the Probabilistic Models for Safety Analysis (ProMoSA) project.  ... 
doi:10.1016/j.jss.2013.03.078 fatcat:cnkdqtagkrcepitnqvozer5nze

Channel adversarial training for cross-channel text-independent speaker recognition [article]

Xin Fang, Liang Zou, Jin Li, Lei Sun, Zhen-Hua Ling
2019 arXiv   pre-print
Previously, a few channel compensation algorithms have been proposed, such as Linear Discriminant Analysis (LDA) and Probabilistic LDA.  ...  However, these methods always require the collections of different channels from a specific speaker, which is unrealistic to be satisfied in real scenarios.  ...  Currently, the most promising approaches are end-to-end embedding architectures such as the deep speaker [5] .  ... 
arXiv:1902.09074v1 fatcat:ebmp44srrvhxxf7m35h2rlzgdu

Uncertainty-Aware Compositional System-Level Reliability Analysis [chapter]

Hananeh Aliee, Michael Glaß, Faramarz Khosravi, Jürgen Teich
2020 Embedded Systems  
In this chapter, we propose a methodology for cross-level reliability analysis to tame the ever increasing analysis complexity of contemporary systems under the influence of uncertainties.  ...  The tool thereby uses meta-heuristic algorithms for optimization and enables the comparison of system implementation candidates with objectives represented by uncertainty distributions.  ...  Fig. 3 3 Main application layers according to the embedded system abstraction layers as depicted inFig. 3.  ... 
doi:10.1007/978-3-030-52017-5_19 fatcat:zuhmhu4jnncs5dh2xyabs5w5e4

Fractionated Software for Networked Cyber-Physical Systems: Research Directions and Long-Term Vision [chapter]

Mark-Oliver Stehr, Carolyn Talcott, John Rushby, Pat Lincoln, Minyoung Kim, Steven Cheung, Andy Poggio
2011 Lecture Notes in Computer Science  
These systems may include a variety of devices that sense and affect their environment and the configuration of the system itself. We call such systems Networked Cyber-Physical Systems (NCPS).  ...  NCPS can provide complex, situation-aware, and often critical services in applications such as distributed sensing and surveillance, crisis response, self-assembling structures or systems, networked satellite  ...  Acknowledgments Support from National Science Foundation Grant 0932397 (A Logical Framework for Self-Optimizing Networked Cyber-Physical Systems) and Office of Naval Research Grant N00014-10-1-0365 (Principles  ... 
doi:10.1007/978-3-642-24933-4_7 fatcat:52w7nldn5fc7tjtvla7dbf7kmq

2018 Index IEEE Transactions on Computers Vol. 67

2019 IEEE transactions on computers  
; 1622-1636 Feng, D., see Fu, M., TC Sept. 2018 1259-1272 Analysis  ...  ., TC June 2018 771-783 Faz-Hernandez, A., Lopez, J., Ochoa-Jimenez, E., and Rodriguez-Henriquez, F., A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol  ...  Villegas, A., þ, TC June 2018 816-829 Optimization of Message Encryption for Real-Time Applications in Embedded Systems.  ... 
doi:10.1109/tc.2018.2882120 fatcat:j2j7yw42hnghjoik2ghvqab6ti

Modeling Fluency and Faithfulness for Diverse Neural Machine Translation

Yang Feng, Wanying Xie, Shuhao Gu, Chenze Shao, Wen Zhang, Zhengxin Yang, Dong Yu
2020 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
approach a 0-1 distribution.  ...  and meanwhile tends to form a translation equivalent in meaning to the source.  ...  In this way, the probability distribution of each prediction is expected to reach a 0-1 distribution with the ground truth word approaching to 1 and other words in the target vocabulary close to 0.  ... 
doi:10.1609/aaai.v34i01.5334 fatcat:hn2aj6if5vbrddcfxnk7tvypbi

A model-checking-based approach to risk analysis in supply chain consolidations

Li Tan, Shenghan Xu, S.H. Rubin, S.-C. Chen
2009 Integrated Computer-Aided Engineering  
We then apply probabilistic model checking to analyzing risks inherent in a stochastic supply chain model.  ...  In this paper we use a model-checking-based approach to study the impact of different consolidation strategies on risks in supply chains and compare their capacity of risk reduction.  ...  Also, simulation-based approaches in general have a better scalability than formal analysis approaches like ours.  ... 
doi:10.3233/ica-2009-0318 fatcat:gpo7lmqyonhp7mudy5ywmldyem

Deep adaptive feature embedding with local sample distributions for person re-identification

Lin Wu, Yang Wang, Junbin Gao, Xue Li
2018 Pattern Recognition  
To combat the major challenge of cross-view visual variations, deep embedding approaches are proposed by learning a compact feature space from images such that the Euclidean distances correspond to their  ...  To this end, a novel objective function is proposed to jointly optimize similarity metric learning, local positive mining and robust deep embedding.  ...  In contrast, our approach achieves a better result on account of jointly optimizing feature embeddings, adaptive similarity learning and local-ranged positive mining.  ... 
doi:10.1016/j.patcog.2017.08.029 fatcat:xt65d6molnhbfpriyvjskyjeym

Recent Advances in Surrogate Modeling Methods for Uncertainty Quantification and Propagation

Chong Wang, Xin Qiang, Menghui Xu, Tao Wu
2022 Symmetry  
This paper delivers a review of surrogate modeling methods in both uncertainty quantification and propagation scenarios.  ...  To this end, the mathematical models for uncertainty quantification are firstly reviewed, and theories and advances on probabilistic, non-probabilistic and hybrid ones are discussed.  ...  cross validation-based, optimization-based and trust region-based approaches [146, [150] [151] [152] [153] [154] .  ... 
doi:10.3390/sym14061219 fatcat:ofouvrkeiffgpltkm5dp5khyeu

Probabilistic embeddings for speaker diarization [article]

Anna Silnova, Niko Brümmer, Johan Rohdin, Themos Stafylakis, Lukáš Burget
2020 arXiv   pre-print
We apply the proposed probabilistic embeddings as input to an agglomerative hierarchical clustering (AHC) algorithm to do diarization in the DIHARD'19 evaluation set.  ...  Speaker embeddings (x-vectors) extracted from very short segments of speech have recently been shown to give competitive performance in speaker diarization.  ...  European Union's Horizon 2020 grant no. 833635 "ROXANNE and by Czech Ministry of Education, Youth and Sports from the National Programme of Sustainability (NPU II) project "IT4Innovations excellence in  ... 
arXiv:2004.04096v3 fatcat:6vnek77ztrgl7erjnt2od4aqfq
« Previous Showing results 1 — 15 out of 12,756 results