Sciweavers

222 search results - page 13 / 45
» Efficient assertion based verification using TLM
Sort
View
CORR
2010
Springer
144views Education» more  CORR 2010»
14 years 12 months ago
Algorithmic Verification of Single-Pass List Processing Programs
We introduce streaming data string transducers that map input data strings to output data strings in a single left-to-right pass in linear time. Data strings are (unbounded) seque...
Rajeev Alur, Pavol Cerný
ICISC
2004
147views Cryptology» more  ICISC 2004»
15 years 1 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
FLAIRS
2001
15 years 1 months ago
Detection of Inconsistencies in Complex Product Configuration Data Using Extended Propositional SAT-Checking
We present our consistency support tool BIS, an extension to the electronic product data management system (EPDMS) used at DaimlerChrysler AG to configure the Mercedes lines of pa...
Carsten Sinz, Andreas Kaiser, Wolfgang Küchli...
ICB
2009
Springer
181views Biometrics» more  ICB 2009»
14 years 9 months ago
Palm Vein Verification System Based on SIFT Matching
We present in this communication a new biometric system based on the use of hand veins acquired by an infrared imager. After the preprocessing stage and binarization, the vein imag...
Pierre-Olivier Ladoux, Christophe Rosenberger, Ber...
PR
2010
220views more  PR 2010»
14 years 10 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...