Sciweavers

1219 search results - page 192 / 244
» Verification of Equivalent-Results Methods
Sort
View
ICPR
2010
IEEE
13 years 8 months ago
One-Lead ECG-based Personal Identification Using Ziv-Merhav Cross Parsing
The advance of falsification technology increases security concerns and gives biometrics an important role in security solutions. The electrocardiogram (ECG) is an emerging biometr...
David Pereira Coutinho, Ana L. N. Fred, Már...
REFSQ
2010
Springer
13 years 7 months ago
Towards a Framework for Specifying Software Robustness Requirements Based on Patterns
Abstract. [Context and motivation] With increasing use of software, quality attributes grow in relative importance. Robustness is a software quality attribute that has not received...
Ali Shahrokni, Robert Feldt
CDC
2010
IEEE
141views Control Systems» more  CDC 2010»
13 years 5 months ago
Using computer games for hybrid systems controller synthesis
Abstract-- We propose a formal method for feedback controller synthesis using interactive computer programs with graphical interface (in short, computer games). The main theoretica...
A. Agung Julius, Sina Afshari
JCS
2010
80views more  JCS 2010»
13 years 4 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
TCAD
2010
102views more  TCAD 2010»
13 years 4 months ago
Functional Test Generation Using Efficient Property Clustering and Learning Techniques
Abstract--Functional verification is one of the major bottlenecks in system-on-chip design due to the combined effects of increasing complexity and lack of automated techniques for...
Mingsong Chen, Prabhat Mishra