Sciweavers

714 search results - page 57 / 143
» Verification and Compliance Testing
Sort
View
ICBA
2004
Springer
119views Biometrics» more  ICBA 2004»
14 years 3 months ago
Iris Based Human Verification Algorithms
In this paper three algorithms for iris verification have been presented. Iris detection algorithms include the normalization and iris extraction steps. Three algorithms for verifi...
Bhola Ram Meena, Mayank Vatsa, Richa Singh, Phalgu...
ESOP
2009
Springer
14 years 1 months ago
Type-Based Automated Verification of Authenticity in Cryptographic Protocols
Gordon and Jeffrey have proposed a type and effect system for checking authenticity in cryptographic protocols. The type system reduces the protocol verification problem to the typ...
Daisuke Kikuchi, Naoki Kobayashi
IFIP13
2004
13 years 11 months ago
Formal Verification and Validation of Interactive Systems Specifications
: This paper proposes a development process for interactive systems based both on verification and validation methods. Our approach is formal and use at first the B Method. We show...
Yamine Aït Ameur, Benoit Breholée, Pat...
ICIP
2010
IEEE
13 years 8 months ago
Towards computational models of kinship verification
We tackle the challenge of kinship verification using novel feature extraction and selection methods, automatically classifying pairs of face images as "related" or &quo...
Ruogu Fang, Kevin D. Tang, Noah Snavely, Tsuhan Ch...
CADE
2008
Springer
14 years 10 months ago
Exploring Model-Based Development for the Verification of Real-Time Java Code
Many safety- and security-critical systems are real-time systems and, as a result, tools and techniques for verifying real-time systems are extremely important. Simulation and test...
Niusha Hakimipour, Paul A. Strooper, Roger Duke