Sciweavers

1466 search results - page 115 / 294
» Completeness of the Authentication Tests
Sort
View
CVPR
2003
IEEE
14 years 10 months ago
Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA
In this paper we explore object recognition in clutter. We test our object recognition techniques on Gimpy and EZGimpy, examples of visual CAPTCHAs. A CAPTCHA ("Completely Au...
Greg Mori, Jitendra Malik
ITC
2003
IEEE
149views Hardware» more  ITC 2003»
14 years 1 months ago
BIST for Xilinx 4000 and Spartan Series FPGAs: A Case Study
Abstract: We discuss the development of Built-In SelfTest (BIST) configurations that test all of the programmable logic and interconnect resources in the core of Xilinx 4000E, 4000...
Charles E. Stroud, Keshia N. Leach, Thomas A. Slau...
SIGMOD
2000
ACM
141views Database» more  SIGMOD 2000»
14 years 15 days ago
Counting, Enumerating, and Sampling of Execution Plans in a Cost-Based Query Optimizer
Testing an SQL database system by running large sets of deterministic or stochastic SQL statements is common practice in commercial database development. However, code defects oft...
Florian Waas, César A. Galindo-Legaria
ITC
1997
IEEE
121views Hardware» more  ITC 1997»
14 years 10 days ago
BIST-Based Diagnostics of FPGA Logic Blocks
: Accurate diagnosis is an essential requirement in many testing environments, since it is the basis for any repair or replacement strategy used for chip or system fault-tolerance....
Charles E. Stroud, Eric Lee, Miron Abramovici
CVPR
2004
IEEE
14 years 10 months ago
Distortion Estimation Techniques in Solving Visual CAPTCHAs
Abstract-- This paper describes two distortion estimation techniques for object recognition that solve EZ-Gimpy and Gimpy-r, two of the visual CAPTCHAs ("Completely Automated ...
Gabriel Moy, Nathan Jones, Curt Harkless, Randall ...