Sciweavers

289 search results - page 13 / 58
» Verification Patterns for Rapid Embedded System Verification
Sort
View
IFIP
2009
Springer
13 years 5 months ago
Specification and Verification of Side Channel Declassification
Side channel attacks have emerged as a serious threat to the security of both networked and embedded systems
Josef Svenningsson, David Sands
CIARP
2003
Springer
14 years 21 days ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...
RTAS
1998
IEEE
13 years 11 months ago
Verification of the Fast Reservation Protocol with Delayed Transmission using the Tool Kronos
In this paper we report the work carried out at VERIMAG 1 within the framework of an research cooperation with CNET 2 . The goal of this work was twofold: to formally specify the ...
Stavros Tripakis, Sergio Yovine
JUCS
2008
155views more  JUCS 2008»
13 years 7 months ago
Combining Classifiers in the ROC-space for Off-line Signature Verification
: In this work we present a strategy for off-line signature verification. It takes into account a writer-independent model which reduces the pattern recognition problem to a 2-clas...
Luiz S. Oliveira, Edson J. R. Justino, Robert Sabo...
RTCSA
1997
IEEE
13 years 11 months ago
Behavior verification of hybrid real-time requirements by qualitative formalism
Although modern control theories have been successfully applied to solve a variety of problems, they are often mathematically and physically too specific to describe and analyze t...
Jang-Soo Lee, Sung Deok Cha