Sciweavers

1219 search results - page 127 / 244
» Verification of Equivalent-Results Methods
Sort
View
AVBPA
2001
Springer
117views Biometrics» more  AVBPA 2001»
15 years 8 months ago
Hand Recognition Using Implicit Polynomials and Geometric Features
Person identification and verification using biometric methods is getting more and more important in today’s information society; resulting in increased utilization of systems th...
Cenker Öden, Aytül Erçil, Vedat T...
139
Voted
FMCAD
2000
Springer
15 years 7 months ago
Checking Safety Properties Using Induction and a SAT-Solver
We take a fresh look at the problem of how to check safety properties of finite state machines. We are particularly interested in checking safety properties with the help of a SAT-...
Mary Sheeran, Satnam Singh, Gunnar Stålmarck
122
Voted
JIISIC
2008
15 years 4 months ago
Experiences with the use of MERODE in the development of a Web Based Application
This article presents an experience report on using MERODE as the business modeling method for the development of a web application. MERODE has several advantages as improving the...
Karina Chong, María Verónica Mac&iac...
153
Voted
SP
2002
IEEE
161views Security Privacy» more  SP 2002»
15 years 3 months ago
Improving Computer Security Using Extended Static Checking
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Brian Chess
132
Voted
EICS
2009
ACM
15 years 10 months ago
Engineering crowd interaction within smart environments
Smart environments (e.g., airports, hospitals, stadiums, and other physical spaces using ubiquitous computing to empower many mobile people) provide novel challenges for usability...
Michael D. Harrison, Mieke Massink, Diego Latella