Sciweavers

161 search results - page 21 / 33
» Performance Evaluation of Fingerprint Verification Systems
Sort
View
ACMSE
2004
ACM
14 years 23 days ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
ICASSP
2010
IEEE
13 years 7 months ago
Boosted binary features for noise-robust speaker verification
The standard approach to speaker verification is to extract cepstral features from the speech spectrum and model them by generative or discriminative techniques. We propose a nov...
Anindya Roy, Mathew Magimai-Doss, Sébastien...
CSFW
2009
IEEE
13 years 11 months ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
SSS
2010
Springer
125views Control Systems» more  SSS 2010»
13 years 5 months ago
Systematic Correct Construction of Self-stabilizing Systems: A Case Study
Design and implementation of distributed algorithms often involve many subtleties due to their complex structure, non-determinism, and low atomicity as well as occurrence of unanti...
Ananda Basu, Borzoo Bonakdarpour, Marius Bozga, Jo...
HICSS
2007
IEEE
181views Biometrics» more  HICSS 2007»
14 years 1 months ago
A Methodology to Evaluate Agent Oriented Software Engineering Techniques
Systems using Software Agents (or Multi-Agent Systems, MAS) are becoming more popular within the development mainstream because, as the name suggests, an Agent aims to handle task...
Chia-En Lin, Krishna M. Kavi, Frederick T. Sheldon...