The article discusses issues related to the development of educational platforms, the main feature of which is the use of an interactive sandbox, on the basis of which the features of information technology, computer ...
详细信息
The accuracy of Automatic Speech Recognition (ASR) systems is influenced by the quality and context of speech signals, particularly in telephonic environments prone to errors like channel drops and noise, leading to h...
详细信息
This paper addresses the synthesis of reactive systems that enforce hard constraints while optimizing for quality-based soft constraints. We build on recent advancements in combining reactive synthesis with example-ba...
详细信息
This paper presents an open-source, lightweight, yet comprehensive software framework, named RPC, which integrates physics-based simulators, planning and control libraries, debugging tools, and a user-friendly operato...
详细信息
A key challenge in federated learning is statistical heterogeneity, which affects the generalization ability of the global model on each client. To address this issue, we propose a method called Partial Parameter Enha...
详细信息
The proceedings contain 22 papers. The special focus in this conference is on Dependable Software engineering: Theories, Tools and Applications. The topics include: Extending Symbolic Heap to Support Shared Owner...
ISBN:
(纸本)9789819606016
The proceedings contain 22 papers. The special focus in this conference is on Dependable Software engineering: Theories, Tools and Applications. The topics include: Extending Symbolic Heap to Support Shared Ownership;constraint based Invariant Generation with Modular Operations;Data-Dependent WAR Analysis for Efficient Task-based Intermittent Computing;Can Language Models Pretend Solvers? Logic Code Simulation with LLMs;enhancing Multi-modal Regular Expression Synthesis via Large Language Models and Semantic Manipulations of Sub-expressions;Formal Verification of RISC-V Processor Chisel Designs;the Principle of Staking: Formal Verification of Staking Smart Contract;a Contract-based Framework for Formal Verification of Embedded Software;Formalizing x86-64 ISA in Isabelle/HOL: A Binary Semantics for eBPF JIT Correctness;The Design of Intelligent Temperature Control System of Smart House with MARS;universal Construction for Linearizable but Not Strongly Linearizable Concurrent Objects;Cache Behavior Analysis with SP-Relative Addressing for WCET Estimation;timing Analysis of Cause-Effect Chains for External Events with Finite Validity Intervals;runtime Verification of Neural-Symbolic systems;eidos: Efficient, Imperceptible Adversarial 3D Point Clouds;MILE: A Mutation Testing Framework of In-Context Learning systems;a Derivative-based Membership Algorithm for Enhanced Regular Expressions;nanoHook: An Efficient System Call Hooking Technique with One-Byte Invasive;faster Lifetime-Optimal Speculative Partial Redundancy Elimination for Goto-Free Programs;EDSLog: Efficient Log Anomaly Detection Method based on Dataset Partitioning.
Recent advances in artificial intelligence have prompted the use of machine learning methods in network security. In this paper, we address the issue of imbalanced data that is often present in network security datase...
详细信息
The dependency of the Non-functional requirements (NFR) on the operating environment can lead to unexpected behaviors. This may subsequently result in threats to robotic systems after being deployed in an uncontrolled...
详细信息
Transformer-based multilingual question-answering models are used to detect causality in financial text data. This study employs BERT (Devlin et al., 2019) for English text and XLM-RoBERTa (Conneau et al., 2020) for S...
详细信息
Tumors are one of the most common tumors in humans, and the main treatment at present is surgical removal. Preoperative planning of tumors usually requires a professional doctor to manually segment the images, but thi...
详细信息
暂无评论