Sciweavers

714 search results - page 76 / 143
» Verification and Compliance Testing
Sort
View
ICCTA
2007
IEEE
15 years 4 months ago
Register Sharing Verification During Data-Path Synthesis
The variables of the high-level specifications and the automatically generated temporary variables are mapped on to the data-path registers during data-path synthesis phase of hig...
Chandan Karfa, Chittaranjan A. Mandal, Dipankar Sa...
COLING
2008
15 years 2 months ago
Verification and Implementation of Language-Based Deception Indicators in Civil and Criminal Narratives
Our goal is to use natural language processing to identify deceptive and nondeceptive passages in transcribed narratives. We begin by motivating an analysis of language-based dece...
Joan Bachenko, Eileen Fitzpatrick, Michael Schonwe...
90
Voted
ISSA
2004
15 years 1 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche
ICASSP
2010
IEEE
15 years 23 days ago
Boosted binary features for noise-robust speaker verification
The standard approach to speaker verification is to extract cepstral features from the speech spectrum and model them by generative or discriminative techniques. We propose a nov...
Anindya Roy, Mathew Magimai-Doss, Sébastien...
106
Voted
JAR
2006
99views more  JAR 2006»
15 years 16 days ago
An Integrated Approach to High Integrity Software Verification
Using automated reasoning techniques, we tackle the niche activity of proving that a program is free from run-time exceptions. Such a property is particularly valuable in high inte...
Andrew Ireland, Bill J. Ellis, Andrew Cook, Roderi...