Sciweavers

504 search results - page 71 / 101
» Explaining Verification Conditions
Sort
View
CAV
2010
Springer
206views Hardware» more  CAV 2010»
13 years 11 months ago
Dynamic Cutoff Detection in Parameterized Concurrent Programs
We consider the class of finite-state programs executed by an unbounded number of replicated threads communicating via shared variables. The thread-state reachability problem for t...
Alexander Kaiser, Daniel Kroening, Thomas Wahl
ICPR
2010
IEEE
13 years 11 months ago
How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values?
In the biometric verification, authentication is given when a distance of biometric signatures between enrollment and test phases is less than an acceptance threshold, and the perf...
Yasushi Makihara, Md. Altab Hossain, Yasushi Yagi
AMW
2010
13 years 9 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
FORTE
2008
13 years 9 months ago
An SMT Approach to Bounded Reachability Analysis of Model Programs
Model programs represent transition systems that are used fy expected behavior of systems at a high level of abstraction. The main application area is application-level network pro...
Margus Veanes, Nikolaj Bjørner, Alexander R...
LREC
2008
119views Education» more  LREC 2008»
13 years 9 months ago
Text Independent Speaker Identification in Multilingual Environments
Speaker identification and verification systems have a poor performance when model training is done in one language while the testing is done in another. This situation is not unu...
Iker Luengo, Eva Navas, Iñaki Sainz, Ibon S...