Showing 1 - 15 results of 15 for search '"Finite state machine"', query time: 0.07s Refine Results
  1. 1

    A clocked finite state machine built from DNA. by Costa Santini, C, Bath, J, Tyrrell, A, Turberfield, A

    Published 2013
    “…We implement a finite state machine by representing state, transition rules and input symbols with DNA components. …”
    Journal article
  2. 2

    Iterated Boolean games by Gutierrez, J, Harrenstein, B, Wooldridge, M

    Published 2015
    “…In order to represent the strategies of players in such games, we use a finite state machine model. After introducing and formally defining iterated Boolean games, we investigate the computational complexity of their associated game-theoretic decision problems, as well as semantic conditions characterising classes of LTL properties that are preserved by equilibrium points (pure-strategy Nash equilibria) whenever they exist.…”
    Journal article
  3. 3

    Synchronous Protocol Automata: A Framework for Modelling and Verification of SoC Communication Architectures by D'Silva, V, Ramesh, S, Sowmya, A

    Published 2004
    “…We present a synchronous, Finite State Machine based framework for modelling communication aspects of such architectures. …”
    Conference item
  4. 4

    Synchronous protocol automata: a framework for modelling and verification of SoC communication architectures by D'Silva, V, Ramesh, S, Sowmya, A

    Published 2005
    “…A synchronous, finite state machine framework for modelling communication aspects of such architecture is presented. …”
    Journal article
  5. 5

    SACCADE AND PURSUIT ON AN ACTIVE HEAD EYE PLATFORM by Bradshaw, K, Mclauchlan, P, Reid, I, Murray, D

    Published 1994
    “…A gaze controller which selects results from the two visual processes and controls the movement of the head platform is implemented as a finite state machine. © 1994.…”
    Journal article
  6. 6

    Iterated Boolean games by Gutierrez, J, Harrenstein, P, Wooldridge, M

    Published 2013
    “…In order to model the strategies that players use in such games, we use a finite state machine model. After introducing and formally defining iterated Boolean games, we investigate the computational complexity of their associated game-theoretic decision problems as well as semantic conditions characterising classes of LTL properties that are preserved by pure strategy Nash equilibria whenever they exist.…”
    Conference item
  7. 7

    Run-time monitoring of data-handling violations by Happa, J, Moffat, N, Goldsmith, M, Creese, S

    Published 2019
    “…This paper proposes a finite-state-machine method for detecting violations of preferences (consents and revocations) expressed by Data Subjects regarding use of their personal data, and also violations of any related obligations that might be placed upon data handlers (data controllers and processors). …”
    Conference item
  8. 8

    DRIVING SACCADE TO PURSUIT USING IMAGE MOTION by Murray, D, Bradshaw, K, Mclauchlan, P, Reid, I, Sharkey, P

    Published 1995
    “…To couple the different visual activities of waiting, saccading, pursuing and panicking, we use a finite state machine which provides inherent robustness outside of visual processing and provides a means of making repeated exploration. …”
    Journal article
  9. 9

    Reducing domestic energy consumption through behaviour modification by Ford, R

    Published 2009
    “…</p> <p>Three sets of features including the short term time domain, time dependent finite state machine behaviour and time of day are identified by monitoring step changes in the power consumption of the home. …”
    Thesis
  10. 10

    Safe and certified reinforcement learning with logical constraints by Hasanbeig, MH

    Published 2020
    “…We convert the given property into a Limit Deterministic Buchi Automaton (LDBA), namely a finite-state machine expressing the property. Further, by exploiting the structure of the LDBA, we shape a synchronous reward function on-the-fly, and we discuss the assumptions under which RL is guaranteed to synthesise control policies whose traces satisfy the LTL specification with maximum probability possible. …”
    Thesis
  11. 11

    Exacerbations in chronic obstructive pulmonary disease: Identification and prediction using a digital health system by Shah, S, Velardo, C, Farmer, A, Tarassenko, L

    Published 2017
    “…</p> <p>Methods: We used data from 110 patients, with a combined monitoring period of more than 35,000 days. We propose a finite-state machine–based approach for modeling COPD exacerbation to gain a deeper insight into COPD patient condition during home monitoring to take account of the time course of symptoms. …”
    Journal article
  12. 12

    A Refinement Approach to Design and Verification of On−Chip Communication Protocols by Böhm, P, Melham, T

    Published 2008
    “…Our modeling framework consists of design steps and design transformations formalized as finite state machines. Given a verified design step, transformations are used to extend the system with advanced features. …”
    Conference item
  13. 13

    A Refinement Approach to Design and Verification of On-Chip Communication Protocols by Boehm, P, Melham, T

    Published 2008
    “…Our modeling framework consists of design steps and design transformations formalized as finite state machines. Given a verified design step, transformations are used to extend the system with advanced features. …”
    Conference item
  14. 14

    Operational algorithmic game semantics by Bunting, B, Murawski, AS

    Published 2023
    “…We also identify a fragment for which these automata are finite-state machines.Further, we use the trace model to prove that translations of prototypical call-by-name (IA) and call-by-value (RML) languages into our call-by-push-value language are fully abstract. …”
    Conference item
  15. 15

    Automata vs. Logics on Data Words by Benedikt, M, Ley, C, Puppis, G

    Published 2010
    “…Kaminski and Francez introduced a class of automata called finite memory automata (FMA), that represent a natural analog of finite state machines. A FMA can use, in addition to its control state, a (bounded) number of registers to store and compare values from the input word. …”
    Conference item