Sciweavers

1518 search results - page 139 / 304
» Cryptographic Test Correction
Sort
View
JAL
1998
85views more  JAL 1998»
15 years 3 months ago
Isomorph-Free Exhaustive Generation
We describe a very general technique for generating families of combinatorial objects without isomorphs. It applies to almost any class of objects for which an inductive construct...
Brendan D. McKay
142
Voted
KBSE
2010
IEEE
15 years 2 months ago
A bounded statistical approach for model checking of unbounded until properties
We study the problem of statistical model checking of probabilistic systems for PCTL unbounded until property P1p(ϕ1 U ϕ2) (where 1 ∈ {<, ≤, >, ≥}) using the computa...
Ru He, Paul Jennings, Samik Basu, Arka P. Ghosh, H...
155
Voted
APSEC
2009
IEEE
15 years 1 months ago
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification
Abstract--Formal methods are very useful in software industry and are becoming of paramount importance in practical engineering techniques. They involve the design and the modeling...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
131
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Detection of synthetic speech for the problem of imposture
In this paper, we present new results from our research into the vulnerability of a speaker verification (SV) system to synthetic speech. We use a HMM-based speech synthesizer, w...
Phillip L. De Leon, Inma Hernáez, Ibon Sara...
135
Voted
WAPCV
2007
Springer
15 years 10 months ago
Differences and Interactions Between Cerebral Hemispheres When Processing Ambiguous Words
It is well known that the brain (especially the cortex) is structurally separable into two hemispheres. Many neuropsychological studies show that the process of ambiguity resoluti...
Orna Peleg, Zohar Eviatar, Hananel Hazan, Larry M....