Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    A Comprehensive Source Code Plagiarism Detection Software

    Source code plagiarism is a simple to finish task, yet exceptionally hard to identify without legitimate device support. Different source code recognition frameworks have been created to help distinguish sourc...

    Amay Dilip Jain, Ankur Gupta in Innovations in Computational Intelligence … (2022)

  2. No Access

    Chapter and Conference Paper

    AB-net: Adult- Baby Net

    The problem of estimating and classifying age from a given input im- age is age old. With the advancement of modern technology and recent progress in the field of deep learning it has been made possible to gai...

    Sahil Salim Makandar, Ashish Tiwari in Computer Vision and Image Processing (2022)

  3. No Access

    Chapter and Conference Paper

    Towards Drone Flocking Using Relative Distance Measurements

    We introduce a method to form and maintain a flock of drones only based on relative distance measurements. This means our approach is able to work in GPS-denied environments. It is fully distributed and theref...

    Andreas Brandstätter, Scott A. Smolka in Leveraging Applications of Formal Methods,… (2022)

  4. No Access

    Chapter and Conference Paper

    Design and Analysis of Low-Power PLL for Digital Applications

    This paper discusses the challenges and outcomes in designing the low-power PLL for digital applications. PLL being an important block for providing clocking scheme in many electronic circuits raises the requi...

    Ashish Tiwari, Renu Prabha Sahu in International Conference on Advanced Compu… (2019)

  5. No Access

    Chapter and Conference Paper

    Output Range Analysis for Deep Feedforward Neural Networks

    Given a neural network (NN) and a set of possible inputs to the network described by polyhedral constraints, we aim to compute a safe over-approximation of the set of possible output values. This operation is ...

    Souradeep Dutta, Susmit Jha, Sriram Sankaranarayanan, Ashish Tiwari in NASA Formal Methods (2018)

  6. No Access

    Chapter and Conference Paper

    Attacking the V: On the Resiliency of Adaptive-Horizon MPC

    Inspired by the emerging problem of CPS security, we introduce the concept of controller-attacker games. A controller-attacker game is a two-player stochastic game, where the two players, a controller and an atta...

    Ashish Tiwari, Scott A. Smolka in Automated Technology for Verification and … (2017)

  7. No Access

    Book and Conference Proceedings

    Automated Reasoning

    8th International Joint Conference, IJCAR 2016, Coimbra, Portugal, June 27 – July 2, 2016, Proceedings

    Nicola Olivetti, Ashish Tiwari in Lecture Notes in Computer Science (2016)

  8. No Access

    Chapter and Conference Paper

    Gamifying Program Analysis

    Abstract interpretation is a powerful tool in program verification. Several commercial or industrial scale implementations of abstract interpretation have demonstrated that this approach can verify safety prop...

    Daniel Fava, Julien Signoles in Logic for Programming, Artificial Intellig… (2015)

  9. No Access

    Chapter and Conference Paper

    Program Synthesis Using Dual Interpretation

    We present an approach for component-based program synthesis that uses two distinct interpretations for the symbols in the program. The first interpretation defines the semantics of the program. It is used to ...

    Ashish Tiwari, Adrià Gascón, Bruno Dutertre in Automated Deduction - CADE-25 (2015)

  10. No Access

    Chapter and Conference Paper

    Severity Levels of Inconsistent Code

    Inconsistent code detection is a variant of static analysis that detects statements that never occur on feasible executions. This includes code whose execution ultimately must lead to an error, faulty error ha...

    Martin Schäf, Ashish Tiwari in Automated Technology for Verification and Analysis (2015)

  11. No Access

    Chapter and Conference Paper

    Service Adaptive Broking Mechanism Using MROSP Algorithm

    Cloud computing is an effort in delivering resources as a service. It represents a shift away from the era where products were purchased, to computing as a service that is delivered to consumers over the inter...

    Ashish Tiwari, Vipin Sharma, Mehul Mahrishi in Advanced Computing, Networking and Informa… (2014)

  12. No Access

    Chapter and Conference Paper

    Synthesis for Polynomial Lasso Programs

    We present a method for the synthesis of polynomial lasso programs. These programs consist of a program stem, a set of transitions, and an exit condition, all in the form of algebraic assertions (conjunctions ...

    Jan Leike, Ashish Tiwari in Verification, Model Checking, and Abstract Interpretation (2014)

  13. No Access

    Article

    Non-Linear Rewrite Closure and Weak Normalization

    A rewrite closure is an extension of a term rewrite system with new rules, usually deduced by transitivity. Rewrite closures have the nice property that all rewrite derivations can be transformed into derivati...

    Carles Creus, Guillem Godoy, Francesc Massanes in Journal of Automated Reasoning (2013)

  14. Chapter and Conference Paper

    HybridSAL Relational Abstracter

    This paper describes the HybridSAL relational abstracter – a tool for verifying continuous and hybrid dynamical systems. The input to the tool is a model of a hybrid dynamical system and a safety property. The...

    Ashish Tiwari in Computer Aided Verification (2012)

  15. Chapter and Conference Paper

    Timed Relational Abstractions for Sampled Data Control Systems

    In this paper, we define timed relational abstractions for verifying sampled data control systems. Sampled data control systems consist of a plant, modeled as a hybrid system and a synchronous controller, mode...

    Aditya Zutshi, Sriram Sankaranarayanan, Ashish Tiwari in Computer Aided Verification (2012)

  16. No Access

    Chapter and Conference Paper

    Rewriting in Practice

    The field of rewriting is broadly concerned with manipulating representations of objects so that we go from a larger representation to a smaller representation. The field of rewriting has contributed some fundame...

    Ashish Tiwari in Typed Lambda Calculi and Applications (2011)

  17. Chapter and Conference Paper

    Relational Abstractions for Continuous and Hybrid Systems

    In this paper, we define relational abstractions of hybrid systems. A relational abstraction is obtained by replacing the continuous dynamics in each mode by a binary transition relation that relates a state o...

    Sriram Sankaranarayanan, Ashish Tiwari in Computer Aided Verification (2011)

  18. No Access

    Chapter and Conference Paper

    Combining Equational Reasoning

    Given a theory \(\mathbb{T}\) , a set of equations E, and a single equation e, the uniform word problem (UWP) is to dete...

    Ashish Tiwari in Frontiers of Combining Systems (2009)

  19. Chapter and Conference Paper

    Constraint-Based Approach for Analysis of Hybrid Systems

    This paper presents a constraint-based technique for discovering a rich class of inductive invariants (boolean combinations of polynomial inequalities of bounded degree) for verification of hybrid systems. The...

    Sumit Gulwani, Ashish Tiwari in Computer Aided Verification (2008)

  20. No Access

    Chapter and Conference Paper

    Termination of Rewriting with Right-Flat Rules

    Termination and innermost termination are shown to be decidable for term rewrite systems whose right-hand side terms are restricted to be shallow (variables occur at depth at most one) and linear. Innermost te...

    Guillem Godoy, Eduard Huntingford, Ashish Tiwari in Term Rewriting and Applications (2007)

previous disabled Page of 2