نتایج جستجو برای: verified computation
تعداد نتایج: 210263 فیلتر نتایج به سال:
Theorem provers, such as ACL2, HOL, Isabelle and Coq, rely on the correctness of runtime systems for programming languages like ML, OCaml or Common Lisp. These runtime systems are complex and critical to the integrity of the theorem provers. In this paper, we present a new Lisp runtime which has been formally verified and can run the Milawa theorem prover. Our runtime consists of 7,500 lines of...
This paper is concerned with the problem of verifying an accuracy of a numerical solution of a linear system with an arbitrarily ill-conditioned coefficient matrix. In this paper, a method of obtaining an accurate numerical solution of such a linear system and its verified error bound is proposed. The proposed method is based on the accurate computation of dot product and IEEE standard 754 arit...
We describe a procedure based on the Krawczyk method to compute a verified enclosure for the stabilizing solution of a continuoustime algebraic Riccati equation A∗X + XA + Q = XGX, building on the work of [B. Hashemi, SCAN 2012] and adding several modifications to the Krawczyk procedure. Moreover, we describe a new O(n) direct method for verification, based on a fixed-point formulation of the e...
This paper presents an approach to the formal verification of safety properties of the behaviour-based control network of the mobile outdoor robot RAVON. In particular, we consider behaviours that are used for the computation of the projected vehicle’s velocity from obstacle proximity sensor data and inclination information. We describe how this group of behaviours is implemented in the synchro...
ValEncIA-IVP is a verified solver for initial value problems for sets of ordinary differential equations which determines guaranteed enclosures of all reachable states. In this paper, we present its new features which allow for a wider application domain. They also improve the performance of ValEncIA-IVP. Especially for the simulation of asymptotically stable systems, we present a new exponenti...
We have used a neural network to compute corrections for images written by electron beams to eliminate the proximity effects caused by electron scattering. Iterative methods are effective. but require prohibitively computation time. We have instead trained a neural network to perform equivalent corrections. resulting in a significant speed-up. We have examined hardware implementations using bot...
To estimate and predict the transmission dynamics of respiratory viruses, the estimation of the basic reproduction number, R0, is essential. Recently, approximate Bayesian computation methods have been used as likelihood free methods to estimate epidemiological model parameters, particularly R0. In this paper, we explore various machine learning approaches, the multi-layer perceptron, convoluti...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید