A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Probabilistic Formal Analysis Approach to Cross Layer Optimization in Distributed Embedded Systems
[chapter]
2007
Lecture Notes in Computer Science
We present a novel approach, based on probabilistic formal methods, to developing cross-layer resource optimization policies for resource limited distributed systems. ...
We describe how existing statistical approaches have been adapted and improved to provide analyses of given cross-layered optimization policies with quantifiable confidence. ...
To leverage our prior effort, we are integrating formal methods with cross-layer optimization in a unified framework. ...
doi:10.1007/978-3-540-72952-5_18
fatcat:xmxvxygumfewbnientp4mkj6vu
Integration of formal analysis with dynamic behavior from system execution results in a feedback loop that enables model refinement and further optimization of policies and parameters. ...
We demonstrate the applicability of this approach to the adaptive provisioning of resource-limited distributed real-time systems using a mobile multimedia case study. ...
A Formal Methodology for Cross-Layer Tuning of Mobile Embedded Systems 73:3 bounds for critical performance parameters. ...
doi:10.1145/2362336.2362340
fatcat:22rpg3r3i5cp5g5gznxy5vx53m
xTune
2008
ACM SIGBED Review
In this context, a holistic cross-layer optimization considering multiple layers (e.g., application, middleware, operating system) needs to be developed for continuous adaptation of system parameters. ...
The integration of formal analysis with dynamic behavior from system execution will result in a feedback loop that enables model refinement and further optimization of policies and parameters. ...
Our recent study in [5] proposes an iterative tuning approach for DRE (Distributed Real-time Embedded) systems that couples two important facets: i) a light-weight, on-the-fly formal verification, and ...
doi:10.1145/1366283.1366307
fatcat:3cksnmaiizhprlvbl6r5ztsg7m
A Formal Methodology for Compositional Cross-Layer Optimization
[chapter]
2011
Lecture Notes in Computer Science
The formal specification is then analyzed using statistical analysis, to determine the impact of various policies for achieving a variety of end-to-end properties in a quantifiable manner. ...
The integration of formal analysis with dynamic behavior from system execution results in a feedback loop that enables model refinement and further optimization of policies and parameters. ...
To analyze the behavior of the system (e.g., in terms of discrete or continuous observable properties) in a probabilistic sense, we have implemented two lightweight formal analysis techniques: statistical ...
doi:10.1007/978-3-642-24933-4_10
fatcat:vocrn6zoizcgdfzkscymtz3wfu
State-of-the-art tools and techniques for quantitative modeling and analysis of embedded systems
2012
2012 Design, Automation & Test in Europe Conference & Exhibition (DATE)
This paper surveys well-established/recent tools and techniques developed for the design of rigorous embedded systems. ...
The tool uses a symbolic algorithm for solving minimum cost reachability problems, with several applications to optimization for embedded systems, including Worst-Case Execution Times (WCET) analysis ...
The idea behind MODEST is to provide a single-formalism, multi-solution approach to modelling and analysis: Many wellknown models are subsumed by STA, such as (probabilistic) timed automata ((P)TA, [12 ...
doi:10.1109/date.2012.6176499
dblp:conf/date/BozgaDHHLLT12
fatcat:jhl5e4fo7neupgnapdhd2eitfa
Efficient optimization of large probabilistic models
2013
Journal of Systems and Software
We propose an integrated approach for modeling, analysis and optimization of safety critical systems. It is fully automated with an implementation based on the Eclipse platform. ...
The approach is tool-independent, different analysis tools can be used and there exists an API for the integration of different optimization and estimation algorithms. ...
Acknowledgement: Simon Struck is funded by the German Research Foundation (DFG) within the Probabilistic Models for Safety Analysis (ProMoSA) project. ...
doi:10.1016/j.jss.2013.03.078
fatcat:cnkdqtagkrcepitnqvozer5nze
Channel adversarial training for cross-channel text-independent speaker recognition
[article]
2019
arXiv
pre-print
Previously, a few channel compensation algorithms have been proposed, such as Linear Discriminant Analysis (LDA) and Probabilistic LDA. ...
However, these methods always require the collections of different channels from a specific speaker, which is unrealistic to be satisfied in real scenarios. ...
Currently, the most promising approaches are end-to-end embedding architectures such as the deep speaker [5] . ...
arXiv:1902.09074v1
fatcat:ebmp44srrvhxxf7m35h2rlzgdu
Uncertainty-Aware Compositional System-Level Reliability Analysis
[chapter]
2020
Embedded Systems
In this chapter, we propose a methodology for cross-level reliability analysis to tame the ever increasing analysis complexity of contemporary systems under the influence of uncertainties. ...
The tool thereby uses meta-heuristic algorithms for optimization and enables the comparison of system implementation candidates with objectives represented by uncertainty distributions. ...
Fig. 3 3 Main application layers according to the embedded system abstraction layers as depicted inFig. 3. ...
doi:10.1007/978-3-030-52017-5_19
fatcat:zuhmhu4jnncs5dh2xyabs5w5e4
Fractionated Software for Networked Cyber-Physical Systems: Research Directions and Long-Term Vision
[chapter]
2011
Lecture Notes in Computer Science
These systems may include a variety of devices that sense and affect their environment and the configuration of the system itself. We call such systems Networked Cyber-Physical Systems (NCPS). ...
NCPS can provide complex, situation-aware, and often critical services in applications such as distributed sensing and surveillance, crisis response, self-assembling structures or systems, networked satellite ...
Acknowledgments Support from National Science Foundation Grant 0932397 (A Logical Framework for Self-Optimizing Networked Cyber-Physical Systems) and Office of Naval Research Grant N00014-10-1-0365 (Principles ...
doi:10.1007/978-3-642-24933-4_7
fatcat:52w7nldn5fc7tjtvla7dbf7kmq
2018 Index IEEE Transactions on Computers Vol. 67
2019
IEEE transactions on computers
; 1622-1636 Feng, D., see Fu, M., TC Sept. 2018 1259-1272 Analysis ...
., TC June 2018 771-783 Faz-Hernandez, A., Lopez, J., Ochoa-Jimenez, E., and Rodriguez-Henriquez, F., A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol ...
Villegas, A., þ, TC June 2018 816-829
Optimization of Message Encryption for Real-Time Applications in
Embedded Systems. ...
doi:10.1109/tc.2018.2882120
fatcat:j2j7yw42hnghjoik2ghvqab6ti
Modeling Fluency and Faithfulness for Diverse Neural Machine Translation
2020
PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE
approach a 0-1 distribution. ...
and meanwhile tends to form a translation equivalent in meaning to the source. ...
In this way, the probability distribution of each prediction is expected to reach a 0-1 distribution with the ground truth word approaching to 1 and other words in the target vocabulary close to 0. ...
doi:10.1609/aaai.v34i01.5334
fatcat:hn2aj6if5vbrddcfxnk7tvypbi
A model-checking-based approach to risk analysis in supply chain consolidations
2009
Integrated Computer-Aided Engineering
We then apply probabilistic model checking to analyzing risks inherent in a stochastic supply chain model. ...
In this paper we use a model-checking-based approach to study the impact of different consolidation strategies on risks in supply chains and compare their capacity of risk reduction. ...
Also, simulation-based approaches in general have a better scalability than formal analysis approaches like ours. ...
doi:10.3233/ica-2009-0318
fatcat:gpo7lmqyonhp7mudy5ywmldyem
Deep adaptive feature embedding with local sample distributions for person re-identification
2018
Pattern Recognition
To combat the major challenge of cross-view visual variations, deep embedding approaches are proposed by learning a compact feature space from images such that the Euclidean distances correspond to their ...
To this end, a novel objective function is proposed to jointly optimize similarity metric learning, local positive mining and robust deep embedding. ...
In contrast, our approach achieves a better result on account of jointly optimizing feature embeddings, adaptive similarity learning and local-ranged positive mining. ...
doi:10.1016/j.patcog.2017.08.029
fatcat:xt65d6molnhbfpriyvjskyjeym
Recent Advances in Surrogate Modeling Methods for Uncertainty Quantification and Propagation
2022
Symmetry
This paper delivers a review of surrogate modeling methods in both uncertainty quantification and propagation scenarios. ...
To this end, the mathematical models for uncertainty quantification are firstly reviewed, and theories and advances on probabilistic, non-probabilistic and hybrid ones are discussed. ...
cross validation-based, optimization-based and trust region-based approaches [146, [150] [151] [152] [153] [154] . ...
doi:10.3390/sym14061219
fatcat:ofouvrkeiffgpltkm5dp5khyeu
Probabilistic embeddings for speaker diarization
[article]
2020
arXiv
pre-print
We apply the proposed probabilistic embeddings as input to an agglomerative hierarchical clustering (AHC) algorithm to do diarization in the DIHARD'19 evaluation set. ...
Speaker embeddings (x-vectors) extracted from very short segments of speech have recently been shown to give competitive performance in speaker diarization. ...
European Union's Horizon 2020 grant no. 833635 "ROXANNE and by Czech Ministry of Education, Youth and Sports from the National Programme of Sustainability (NPU II) project "IT4Innovations excellence in ...
arXiv:2004.04096v3
fatcat:6vnek77ztrgl7erjnt2od4aqfq
« Previous
Showing results 1 — 15 out of 12,756 results