Sciweavers

714 search results - page 75 / 143
» Verification and Compliance Testing
Sort
View
ENTCS
2006
90views more  ENTCS 2006»
15 years 17 days ago
Runtime Verification for High-Confidence Systems: A Monte Carlo Approach
We present a new approach to runtime verification that utilizes classical statistical techniques such as Monte Carlo simulation, hypothesis testing, and confidence interval estima...
Sean Callanan, Radu Grosu, Abhishek Rai, Scott A. ...
PR
2010
141views more  PR 2010»
14 years 7 months ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...
ICASSP
2011
IEEE
14 years 4 months ago
Speaker verification using sparse representation classification
Sparse representations of signals have received a great deal of attention in recent years, and the sparse representation classifier has very lately appeared in a speaker recogniti...
Jia Min Karen Kua, Eliathamby Ambikairajah, Julien...
85
Voted
ICC
2007
IEEE
15 years 6 months ago
On the Verification of the Gravity Model Used for Mobility Modeling
— Gravity model used to model transport flow has proven invaluable in urban planning. Some recent work has proposed to use gravity model to predict user movements in cellular net...
Yong Huat Chew, Shinobu Nanba, Peng Keong Tham, Bo...
ICIP
2007
IEEE
15 years 6 months ago
A Novel Kernel Discriminant Analysis for Face Verification
In this paper a novel non-linear subspace method for face verification is proposed. The problem of face verification is considered as a two-class problem (genuine versus imposto...
Georgios Goudelis, Stefanos Zafeiriou, Anastasios ...