Sciweavers

5234 search results - page 192 / 1047
» Method Components - Rationale Revealed
Sort
View
125
Voted
ACHI
2008
IEEE
15 years 10 months ago
Face Authentication for Banking
—This paper analyzes the benefit and the limitations of using a particular biometric technology “namely face authentication” for banking applications. We present first the ge...
Baptiste Hemery, Julien Mahier, Marc Pasquet, Chri...
ICMCS
2006
IEEE
143views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Automatic Classification of Photographs and Graphics
In general, digital images can be classified into photographs and computer graphics. This taxonomy is very useful in many applications, such as web image search. However, there ar...
Yuanhao Chen, Zhiwei Li, Mingjing Li, Wei-Ying Ma
FMCAD
2000
Springer
15 years 7 months ago
Do You Trust Your Model Checker?
Abstract. In this paper we describe the formal specification and verification of the efficient algorithm for real-time model checking implemented in the model checker RAVEN. It was...
Wolfgang Reif, Jürgen Ruf, Gerhard Schellhorn...
158
Voted
FMSB
2008
138views Formal Methods» more  FMSB 2008»
15 years 5 months ago
Combining Intra- and Inter-cellular Dynamics to Investigate Intestinal Homeostasis
Abstract. This paper reports on the multi-scale modelling of an intestinal crypt cellular structure coupled with Wnt signalling. Using formal modelling techniques based on the stoc...
Oksana Tymchyshyn, Marta Z. Kwiatkowska
NIPS
2004
15 years 4 months ago
Solitaire: Man Versus Machine
In this paper, we use the rollout method for policy improvement to analyze a version of Klondike solitaire. This version, sometimes called thoughtful solitaire, has all cards reve...
Xiang Yan, Persi Diaconis, Paat Rusmevichientong, ...