Sciweavers

1356 search results - page 48 / 272
» The ideal of verified software
Sort
View
ICSE
2009
IEEE-ACM
15 years 6 months ago
Towards safety guarantees for service-oriented systems
In this paper I will address the problem of verifying that a service-oriented embedded system fulÀlls required safety guarantees. Services will be represented by collaborations a...
Basil Becker
ETFA
2005
IEEE
15 years 5 months ago
A security architecture for data privacy and security
Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verif...
Alfred C. Weaver
BIOID
2008
130views Biometrics» more  BIOID 2008»
15 years 1 months ago
Evaluating Systems Assessing Face-Image Compliance with ICAO/ISO Standards
This paper focuses on the requirements for face images to be used in Machine Readable Travel Documents, defined in the ISO/IEC 19794-5 standard. In particular an evaluation framewo...
Matteo Ferrara, Annalisa Franco, Davide Maltoni
JSC
2010
83views more  JSC 2010»
14 years 6 months ago
Computing differential characteristic sets by change of ordering
We describe an algorithm for converting a characteristic set of a prime differential ideal from one ranking into another. This algorithm was implemented in many different language...
François Boulier, François Lemaire, ...
ICPR
2008
IEEE
16 years 1 months ago
Recognition of books by verification and retraining
The problem of character recognition in a book should be formulated significantly different from that of a single page or word. An ideal approach to design such a recognizer is to...
C. V. Jawahar, N. V. Neeba