Sciweavers

76 search results - page 10 / 16
» Verifying Real-Time Systems against Scenario-Based Requireme...
Sort
View
AMFG
2003
IEEE
157views Biometrics» more  AMFG 2003»
14 years 3 months ago
Real-time View-based Face Alignment using Active Wavelet Networks
The Active Wavelet Network (AWN) [9] approach was recently proposed for automatic face alignment, showing advantages over Active Appearance Models (AAM), such as more robustness a...
Changbo Hu, Rogerio Feris, Matthew Turk
BPM
2004
Springer
148views Business» more  BPM 2004»
14 years 1 months ago
Interactive Workflow Mining
Many information systems log event data about executed tasks. Workflow mining is concerned with the derivation of a graphical workflow model out of this data. Experience from appl...
Markus Hammori, Joachim Herbst, Niko Kleiner
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
13 years 7 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt
PAMI
2007
150views more  PAMI 2007»
13 years 9 months ago
Continuous Verification Using Multimodal Biometrics
—Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to reauthenticate himself for continued access to the prote...
Terence Sim, Sheng Zhang, Rajkumar Janakiraman, Sa...
SEFM
2005
IEEE
14 years 3 months ago
Precise Analysis of Memory Consumption using Program Logics
Memory consumption policies provide a means to control resource usage on constrained devices, and play an important role in ensuring the overall quality of software systems, and i...
Gilles Barthe, Mariela Pavlova, Gerardo Schneider