Sciweavers

63 search results - page 11 / 13
» VERITAS - An Application for Knowledge Verification
Sort
View
CMS
2003
148views Communications» more  CMS 2003»
14 years 11 months ago
Computation of Cryptographic Keys from Face Biometrics
We outline cryptographic key–computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable f...
Alwyn Goh, David Ngo Chek Ling
TASLP
2008
149views more  TASLP 2008»
14 years 9 months ago
Using Articulatory Representations to Detect Segmental Errors in Nonnative Pronunciation
Abstract--Motivated by potential applications in second-language pedagogy, we present a novel approach to using articulatory information to improve automatic detection of typical p...
Joseph Tepperman, Shrikanth Narayanan
TLDI
2010
ACM
198views Formal Methods» more  TLDI 2010»
14 years 9 months ago
Verifying event-driven programs using ramified frame properties
Interactive programs, such as GUIs or spreadsheets, often maintain dependency information over dynamically-created networks of objects. That is, each imperative object tracks not ...
Neel R. Krishnaswami, Lars Birkedal, Jonathan Aldr...
SIGSOFT
2005
ACM
15 years 10 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
KDD
2003
ACM
205views Data Mining» more  KDD 2003»
15 years 10 months ago
The data mining approach to automated software testing
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...
Mark Last, Menahem Friedman, Abraham Kandel