Sciweavers

2218 search results - page 275 / 444
» Testing Expressibility Is Hard
Sort
View
98
Voted
ICPR
2010
IEEE
15 years 4 months ago
How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values?
In the biometric verification, authentication is given when a distance of biometric signatures between enrollment and test phases is less than an acceptance threshold, and the perf...
Yasushi Makihara, Md. Altab Hossain, Yasushi Yagi
120
Voted
AIPS
2008
15 years 3 months ago
A Temporal Logic-Based Planning and Execution Monitoring System
As no plan can cover all possible contingencies, the ability to detect failures during plan execution is crucial to the robustness of any autonomous system operating in a dynamic ...
Jonas Kvarnström, Fredrik Heintz, Patrick Doh...
CEAS
2008
Springer
15 years 2 months ago
Improved Phishing Detection using Model-Based Features
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
André Bergholz, Jeong Ho Chang, Gerhard Paa...
APN
2006
Springer
15 years 2 months ago
Invariant Based Programming
Program verification is usually done by adding specifications and invariants to the program and then proving that the verification conditions are all true. This makes program verif...
Ralph-Johan Back
99
Voted
FM
2008
Springer
77views Formal Methods» more  FM 2008»
15 years 2 months ago
A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service
Abstract. Despite more then 30 years of research on protocol specification, the major protocols deployed in the Internet, such as TCP, are described only in informal prose RFCs and...
Tom Ridge, Michael Norrish, Peter Sewell