In this paper, an internal design model called FunState (functions driven by state machines) is presented that enables the representation of different types of system components a...
In this paper we propose a new designated verifier signature scheme based on the threshold signature scheme presented [8] by Ghodosi and Pieprzyk. The advantages of the new scheme ...
In today’s industrial applications, we see that knowledge systems are successfully implemented. However, critical domains require the elaborate and thoughtful validation of the ...
In this paper we propose to use the technology of multiple correlation filters to address the issues involved in still-reference-to-video-sequence face verification. In particular,...
Chunyan Xie, B. V. K. Vijaya Kumar, S. Palanivel, ...
We investigate how to automatically verify that resources such as files are not used improperly or unsafely by a program. We employ a mixture of compile-time analysis and run-time ...