Sciweavers

1914 search results - page 66 / 383
» Verification by Abstract Interpretation
Sort
View
ACSC
2007
IEEE
15 years 4 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
95
Voted
ICASSP
2011
IEEE
14 years 4 months ago
A logarithmic based pole-zero vocal tract model estimation for speaker verification
In this paper we investigate the use of formant and antiformant measurements of nasal consonants for speaker verification. The features are obtained using a pole-zero vocal tract...
Ewald Enzinger, Péter Balázs, Dami&a...
111
Voted
TCAD
2008
114views more  TCAD 2008»
15 years 13 days ago
Word-Level Predicate-Abstraction and Refinement Techniques for Verifying RTL Verilog
el Predicate Abstraction and Refinement Techniques for Verifying RTL Verilog Himanshu Jain, Daniel Kroening, Natasha Sharygina, and Edmund M. Clarke, Fellow, IEEE As a first step, ...
Himanshu Jain, Daniel Kroening, Natasha Sharygina,...
PRICAI
2004
Springer
15 years 5 months ago
On the Intended Interpretations of Actions
Abstract. In this paper we address the problem of commonsense reasoning about action by appealing to Occam’s razor—we should accept the simplest hypothesis explaining the obser...
Victor Jauregui, Maurice Pagnucco, Norman Y. Foo
ICVS
2003
Springer
15 years 5 months ago
Automatic Mapping of Settlement Areas Using a Knowledge-Based Image Interpretation System
Abstract. We introduce the knowledge-based image interpretation system GeoAIDA and give examples for an image operator, extracting trees from aerial imagery. Moreover we present a ...
Bernd-Michael Straub, Markus Gerke, Martin Pahl