A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2001; you can also visit the original URL.
The file type is application/pdf
.
Filters
Embedded UML
2001
Proceedings of the ninth international symposium on Hardware/software codesign - CODES '01
In this paper, we present a proposal for a UML profile called 'Embedded UML'. ...
Finally, it provides an approach which supports the development of automated analysis, simulation, synthesis and code generation tool capabilities which can be provided for design usage even while the ...
code generation. ...
doi:10.1145/371636.371660
dblp:conf/codes/MartinLL01
fatcat:of4rfctsmrfldje6m55mkoi3ku
Shallow Embedding of Type Theory is Morally Correct
[article]
2019
arXiv
pre-print
First, we prove that shallow embedding is injective up to definitional equality, by modelling the embedding as a syntactic translation targeting the metatheory. ...
There are multiple ways to formalise the metatheory of type theory. ...
Compared to a previous formalisation using a deep embedding [3] , it is significantly shorter (322 vs. 1682 lines of code -we only counted the lines of code for the substitution calculus, Π and the universe ...
arXiv:1907.07562v1
fatcat:jbmoelwd6rahxobvvzc5anb3uq
Yet Another Deep Embedding of B:Extending de Bruijn Notations
[article]
2009
arXiv
pre-print
We present Bicoq3, a deep embedding of the B system in Coq, focusing on the technical aspects of the development. ...
The main subjects discussed are related to the representation of sets and maps, the use of induction principles, and the introduction of a new de Bruijn notation providing solutions to various problems ...
On the contrary, a deep embedding is better intuitively described as the development of a virtual machine: the syntax and the semantic of the guest logic are formalised as datatypes of the host logic. ...
arXiv:0902.3865v1
fatcat:tuwq2wber5bxled7r6e2fdwhse
Shallow Embedding of Type Theory is Morally Correct
[chapter]
2019
Lecture Notes in Computer Science
Compared to a previous formalisation using a deep embedding [3] , it is significantly shorter (322 vs. 1682 lines of code -we only counted the lines of code for the substitution calculus, Π and the universe ...
The formalisation of canonicity consists of roughly 1000 lines of Agda code. ...
doi:10.1007/978-3-030-33636-3_12
fatcat:45etyokyhrconpefhajd3j2c34
Certifying Machine Code Safety: Shallow Versus Deep Embedding
[chapter]
2004
Lecture Notes in Computer Science
In a shallow embedding logical formulas are written as HOL predicates, whereas a deep embedding models formulas as a datatype. ...
Such a logic can be realised in Isabelle/HOL either as shallow or deep embedding. ...
Using this mechanism we are able to generate an executable VCG from the definitions in Isabelle.
Deep Embedding
Syntax In a deep embedding we represent logical formulas as a datatype. ...
doi:10.1007/978-3-540-30142-4_22
fatcat:tbmutrduovbfpc7w6f5mlgvlye
Color2Embed: Fast Exemplar-Based Image Colorization using Color Embeddings
[article]
2021
arXiv
pre-print
In this paper, we present a fast exemplar-based image colorization approach using color embeddings named Color2Embed. ...
Second, in order to reduce the process time, our method explicitly extracts the color embeddings and exploits a progressive style feature Transformation network, which injects the color embeddings into ...
The proposed method consists of three main modules: color embeddings generation network, content embeddings generation network and Progressive Feature Formalisation Network (PFFN). ...
arXiv:2106.08017v3
fatcat:eftgpxbuwbbxnelffoh6gjoohq
The algebra of connectors
2007
Proceedings of the 7th ACM & IEEE international conference on Embedded software - EMSOFT '07
We provide a number of properties of AC(P ) used to symbolically simplify and handle connectors. ...
We provide an algebraic formalisation of connectors in BIP. These are used to structure interactions in a componentbased system. A connector relates a set of typed ports. ...
The Engine drives the execution of (the C++ code generated from) a BIP program. ...
doi:10.1145/1289927.1289935
dblp:conf/emsoft/BliudzeS07
fatcat:eb5rs5nwjvbt5nd5gcnjfo2ngy
Formal Verification of Spacecraft Control Programs
2020
ACM Transactions on Embedded Computing Systems
This paper presents a verification approach designed to help spacecraft engineers reduce the effort required for formal verification of low-level control programs executed on custom hardware. ...
We present REDFIN, a processing core used in space missions, and its formal semantics expressed using the proposed metalanguage for state transformers, followed by examples of verification of simple control ...
[12] formalised a subset of the x86 architecture in Coq, using monads for instruction execution semantics, and do-notation for assembly language embedding. ...
doi:10.1145/3391900
fatcat:gkvke6xhjrgexi6fl2u2vcstrm
Detecting Design Patterns by Learning Embedded Code Features
2021
figshare.com
Then we apply a novel approach by using a paragraph embedding algorithm (Doc2vec) to vectorise the semantic representation document into a geometric space to train machine learning classification models ...
We create a textual syntactic, semantic, and lexical representation (SSLR) of the Java classes from the Code-Features extracted from a traversed Abstract Syntax Tree. ...
to evaluate the generated java source code embeddings using different machine learning classifiers. ...
doi:10.6084/m9.figshare.14686989.v1
fatcat:wykzqmsewnd5vo2phtms74etsy
Semantic Embedding of Petri Nets into Event-B
[article]
2005
arXiv
pre-print
The static structure of a Petri-net is captured within a B abstract system through a graph structure. ...
We present an embedding of Petri nets into B abstract systems. The embedding is achieved by translating both the static structure (modelling aspect) and the evolution semantics of Petri nets. ...
There are two main embedding techniques: shallow embedding and semantic embedding (also called deep embedding). ...
arXiv:cs/0510073v1
fatcat:mawqedapmre2zoyfl5pws646vu
Beating the Productivity Checker Using Embedded Languages
2010
Electronic Proceedings in Theoretical Computer Science
This paper gives a method for turning a productive program into a guarded program. ...
The method amounts to defining a problem-specific language as a data type, writing the program in the problem-specific language, and writing a guarded interpreter for this language. ...
= Tree (El a) El (stream a) = Stream (El a) El (a ⊗ b) = El a × El b El A = A The type U defines codes for elements of the universe, and El interprets these codes. ...
doi:10.4204/eptcs.43.3
fatcat:rrtr2bblonelpf37b2ovtlbege
Real-time Java API specifications for high coverage test generation
2012
Proceedings of the 10th International Workshop on Java Technologies for Real-time and Embedded Systems - JTRES '12
Even if there is a rationale behind this particular inconsistency, it demonstrates the effectiveness of our method on production code. ...
This is achieved by basing the test generation on formal verification techniques, namely the KeY system for Java source code verification. ...
A contract can be viewed as a formalised natural description of the method behaviour from the API documentation. ...
doi:10.1145/2388936.2388960
dblp:conf/jtres/AhrendtMP12
fatcat:4jjq2teuc5g7npg3kpsahn3ala
Cross-Lingual Word Embedding Refinement by ℓ_1 Norm Optimisation
[article]
2021
arXiv
pre-print
Cross-Lingual Word Embeddings (CLWEs) encode words from two or more languages in a shared high-dimensional space in which vectors representing words with similar meaning (regardless of language) are closely ...
Extensive experiments are performed involving ten diverse languages and embeddings trained on different corpora. ...
Our code is available at https://github.com/Pzoom522/ L1-Refinement. ...
arXiv:2104.04916v1
fatcat:2tygus6yfbcqblmdk3b3bglx2i
Tool Support for Holistic Modelling of Distributed Embedded Systems in Creol
2009
Electronical Notes in Theoretical Computer Science
A holistic approach to modelling embedded systems is advocated: Many aspects of a system should be analysed in isolation to keep the task manageable, but they often influence each other during integration ...
We focus on sensor networks, which are distributed system that consists of many embedded devices with tight constraints on computational power, energy availability, and timeliness. ...
This is akin to a deep embedding into a theorem prover [28] , with similar advantages and disadvantages. ...
doi:10.1016/j.entcs.2009.07.008
fatcat:d2tahiozebhtda2irecu2t34ne
Transductive Zero-Shot Action Recognition by Word-Vector Embedding
[article]
2016
arXiv
pre-print
To that end, in this study we construct a mapping between visual features and a semantic descriptor of each action category, allowing new categories to be recognised in the absence of any visual training ...
To solve this generalisation problem in ZSL action recognition, we investigate a series of synergistic strategies to improve upon the standard ZSL pipeline. ...
Methodology To formalise the problem a list of notations are first given in Table 1 . ...
arXiv:1511.04458v2
fatcat:yxfn52pdhjfatedmixz4evtiay
« Previous
Showing results 1 — 15 out of 4,601 results