Sciweavers

714 search results - page 102 / 143
» Verification and Compliance Testing
Sort
View
116
Voted
COOP
2004
15 years 1 months ago
Model Checking Groupware Protocols
Abstract. The enormous improvements in the efficiency of model-checking techniques in recent years facilitates their application to ever more complex systems of concurrent and dist...
Maurice H. ter Beek, Mieke Massink, Diego Latella,...
130
Voted
CCR
2011
14 years 7 months ago
Misbehaviors in TCP SACK generation
While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed seven misbehaviors in the generation of SACKs. These misbehaviors...
Nasif Ekiz, Abuthahir Habeeb Rahman, Paul D. Amer
ICASSP
2011
IEEE
14 years 4 months ago
Language-independent constrained cepstral features for speaker recognition
Constrained cepstral systems, which select frames to match various linguistic “constraints” in enrollment and test, have shown significant improvements for speaker verificatio...
Elizabeth Shriberg, Andreas Stolcke
105
Voted
ICPR
2002
IEEE
15 years 5 months ago
Biometric Hash based on Statistical Features of Online Signatures
This paper presents a new approach to generate biometric hash values based on statistical features in online signature signals. Whilst the output of typical online signature verif...
Claus Vielhauer, Ralf Steinmetz, Astrid Mayerh&oum...
ECOOP
2010
Springer
15 years 5 months ago
The Essence of JavaScript
We reduce JavaScript to a core calculus structured as a small-step operational semantics. We present several peculiarities of the language and show that our calculus models them. W...
Arjun Guha, Claudiu Saftoiu, Shriram Krishnamurthi