Sciweavers

289 search results - page 13 / 58
» Verification Patterns for Rapid Embedded System Verification
Sort
View
62
Voted
IFIP
2009
Springer
14 years 7 months ago
Specification and Verification of Side Channel Declassification
Side channel attacks have emerged as a serious threat to the security of both networked and embedded systems
Josef Svenningsson, David Sands
96
Voted
CIARP
2003
Springer
15 years 2 months ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...
75
Voted
RTAS
1998
IEEE
15 years 1 months ago
Verification of the Fast Reservation Protocol with Delayed Transmission using the Tool Kronos
In this paper we report the work carried out at VERIMAG 1 within the framework of an research cooperation with CNET 2 . The goal of this work was twofold: to formally specify the ...
Stavros Tripakis, Sergio Yovine
74
Voted
JUCS
2008
155views more  JUCS 2008»
14 years 9 months ago
Combining Classifiers in the ROC-space for Off-line Signature Verification
: In this work we present a strategy for off-line signature verification. It takes into account a writer-independent model which reduces the pattern recognition problem to a 2-clas...
Luiz S. Oliveira, Edson J. R. Justino, Robert Sabo...
101
Voted
RTCSA
1997
IEEE
15 years 1 months ago
Behavior verification of hybrid real-time requirements by qualitative formalism
Although modern control theories have been successfully applied to solve a variety of problems, they are often mathematically and physically too specific to describe and analyze t...
Jang-Soo Lee, Sung Deok Cha