Sciweavers

5525 search results - page 40 / 1105
» Verification of Model Transformations
Sort
View
ECBS
2010
IEEE
209views Hardware» more  ECBS 2010»
15 years 2 months ago
Continuous Verification of Large Embedded Software Using SMT-Based Bounded Model Checking
The complexity of software in embedded systems has increased significantly over the last years so that software verification now plays an important role in ensuring the overall pr...
Lucas Cordeiro, Bernd Fischer 0002, João Ma...
ICDAR
2003
IEEE
15 years 3 months ago
Text-indicated Writer Verification Using Hidden Markov Models
We propose an HMM-based text-indicated writer verification method, which is based on a challenge and response type of authentication process. In this method, a different text incl...
Yasushi Yamazaki, Tsuyoshi Nagao, Naohisa Komatsu
CIARP
2003
Springer
15 years 2 months ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...
ICSE
1999
IEEE-ACM
15 years 1 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
IGPL
2006
110views more  IGPL 2006»
14 years 9 months ago
Adaptive Model Checking
Abstract. We consider the case where inconsistencies are present between a system and its corresponding model, used for automatic verification. Such inconsistencies can be the resu...
Alex Groce, Doron Peled, Mihalis Yannakakis