A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Optimal Verification of Operations on Dynamic Sets
[chapter]
2011
Lecture Notes in Computer Science
We study the design of protocols for set-operation verification, namely the problem of cryptographically checking the correctness of outsourced set operations performed by an untrusted server over a dynamic ...
Based on a novel extension of the security properties of bilinear-map accumulators as well as on a primitive called accumulation tree, our protocols achieve optimal verification and proof complexity (i.e ...
The views in this paper do not necessarily reflect the views of the sponsors. ...
doi:10.1007/978-3-642-22792-9_6
fatcat:m5qm2fo3xva7bh5etqttyf5bm4
A procedure for power electronic converters design with controllability verification based on the nonlinear dynamical model
2017
2017 IEEE Workshop on Power Electronics and Power Quality Applications (PEPQA)
In this proposed design procedure, system controllability is tested based on set theory in control. ...
Terms-power electronic converters, design procedure, dynamical modeling, set theory in control, controllability, controller design ...
ACKNOWLEDGMENT Authors wish to thank the support offered by the "Estrategia de sostenibilidad 2016-2017" and "Beca Estudiante Instructor" of Universidad de Antioquia (Colombia). ...
doi:10.1109/pepqa.2017.7981688
fatcat:go4clpnnffbelawmvhxifzcuhq
Immutability specification and its applications
2005
Concurrency and Computation
Further, use of immutability information yields substantial reductions (33% to 99%) in the number of dynamic read accesses, and also measurable speedups in the range of 5% to 10% for certain benchmark ...
Compared to a final declaration, an immutability assertion in our framework can express a richer set of immutability properties along three dimensions -lifetime, reachability and context. ...
Acknowledgments We are grateful to Robert O'Callahan and to the anonymous reviewers for their comments on an earlier version of this paper. ...
doi:10.1002/cpe.853
fatcat:lnez6yolobhtpkm4mulnpab5wm
Immutability specification and its applications
2002
Proceedings of the 2002 joint ACM-ISCOPE conference on Java Grande - JGI '02
Further, use of immutability information yields substantial reductions (33% to 99%) in the number of dynamic read accesses, and also measurable speedups in the range of 5% to 10% for certain benchmark ...
Compared to a final declaration, an immutability assertion in our framework can express a richer set of immutability properties along three dimensions -lifetime, reachability and context. ...
Acknowledgments We are grateful to Robert O'Callahan and to the anonymous reviewers for their comments on an earlier version of this paper. ...
doi:10.1145/583810.583833
dblp:conf/java/PechtchanskiS02
fatcat:aglnlcr33rfttcbzwk4j67wpza
xTune
2008
ACM SIGBED Review
This thesis proposes a unified framework that employs iterative policy/parameter tuning by combining light-weight, on-the-fly formal verification with feedback for dynamic adaptation. ...
The integration of formal analysis with dynamic behavior from system execution will result in a feedback loop that enables model refinement and further optimization of policies and parameters. ...
These analysis results enable policy-based operation and adaptation as well as parameter setting of selected policies with quantifiable confidence. ...
doi:10.1145/1366283.1366307
fatcat:3cksnmaiizhprlvbl6r5ztsg7m
SRAM dynamic stability verification by reachability analysis with consideration of threshold voltage variation
2013
Proceedings of the 2013 ACM international symposium on International symposium on physical design - ISPD '13
technology scales down -Process variations, mismatch among transistors cause failures • Nonlinear dynamics of SRAM • Physical mechanisms of failures -Separatrix: boundary separating two stable regions ...
Outline • SRAM failure analysis • SRAM nonlinear dynamics • Verification by reachability analysis • Experimental results • Summary 2 Monday, March 25, 2013 SRAM Failure Analysis • Becomes difficult as ...
variations. • Reachability verification for SRAMs achieved good speed and precision, and can be extended for optimization nominal point on the trajectory: • One operating point in the neighborhood of ...
doi:10.1145/2451916.2451927
dblp:conf/ispd/SongYDS13
fatcat:jzxhtybcafg5xcd3usmgxc3chu
Dynamic Selection Of Magnitude And Phase Based Acoustic Feature Streams For Speaker Verification
2009
Zenodo
Publication in the conference proceedings of EUSIPCO, Glasgow, Scotland, 2009 ...
N . 3: Perform vector quantisation on the set X to form a codebook C. Similarly perform vector quantisation on the set Y to form a codebook D. ...
{Given: Training data for one speaker, consisting of N frames} 2: From the N training frames, extract the set of shorttime spectra X = {X i } and set of feature vectors (MFCC or MODGDF) Y = {Y i } where ...
doi:10.5281/zenodo.41710
fatcat:ntgl4xg6njbmta3acy7zlu4m7y
Control software model checking using bisimulation functions for nonlinear systems
2008
2008 47th IEEE Conference on Decision and Control
The paper presents the convex optimizations required to perform control system verification using a sourcecode model checker, and the method is illustrated for an example of a supervisory control system ...
Sets of reachable continuous states are computed using numerical simulation and bisimulation functions. ...
The operations are used by our verification technique to compute maximally safe sublevel sets and to perform the merging operation. ...
doi:10.1109/cdc.2008.4739247
dblp:conf/cdc/KapinskiDLMWK08
fatcat:gxfuk2ql6nd5bpa4urbk3lulum
On-line Signature Verification Based on GA-SVM
2015
International Journal of Online Engineering (iJOE)
A 27-parameter feature set including shape and dynamic features is extracted from the on-line signatures data. ...
With the development of pen-based mobile device, on-line signature verification is gradually becoming a kind of important biometrics verification. ...
From the collection of the original dynamic data signature extracted signature features include 27 kinds of shape and dynamic feature set, the training of the classifier as the target data. ...
doi:10.3991/ijoe.v11i6.5122
fatcat:uajj2jquffdvlkjx2u6nobnghe
Ongoing Work on Automated Verification of Noisy Nonlinear Systems with Ariadne
[chapter]
2017
Lecture Notes in Computer Science
accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the ...
If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the "Taverne" license above, please follow below link for the End User ...
., that ϕ remains true for all possible executions starting from a set X 0 of initial states, allowing to answer if a system operates within safe operating conditions expressed as a set. ...
doi:10.1007/978-3-319-67549-7_19
fatcat:fwl327jgrbb5rfk3yjtaaq227e
Parameter optimization for biometric fingerprint recognition using genetic algorithms
2006
Proceeding of the 8th workshop on Multimedia and security - MM&Sec '06
For the confirmation of the results, which were found out with this test set, the databases of the Fingerprint Verification Contests of the years 2000, 2002 and 2004 were examined in addition. ...
In this paper, we suggest an optimization approach for fingerprint authentication using genetic algorithms. ...
The best result based on the optimized parameter set was determined on the database 1 (DB1) of the FVC 2000. ...
doi:10.1145/1161366.1161389
dblp:conf/mmsec/ScheidatEV06
fatcat:i5cutmcltrdurkj324koubumyy
Safety verification of reactive controllers for UAV flight in cluttered environments using barrier certificates
2012
2012 IEEE International Conference on Robotics and Automation
We expect that these formal verification techniques will allow for the comparison, and ultimately optimization, of reactive controllers for robustness to varying initial conditions and environments. ...
In contrast to previous work, we use rational functions to globally approximate non-smooth dynamics and use multiple barrier functions to guard against more than one obstacle. ...
Previous work on mobile robots operating around polygonal obstacles often made use of cell decompositions and piecewise models of the dynamics, which can lead to very powerful and efficient planning and ...
doi:10.1109/icra.2012.6225351
dblp:conf/icra/BarryMT12
fatcat:uecirh22bfan3dvyydfylo5idi
Optimization of a Signature Verification System Using Neural Networks
[chapter]
1993
ICANN '93
On the other hand, a system for purpose of granting entry to a secure facility must operate at or near zero false acceptance of forgery in order to be assured of barring any intruder. ...
A majority rule based signature verifi.cation system employs a set of 42 personalized parameter features consisting of both dynamic and static features extracted from sampled signatures by using a graphic ...
On the other hand, a system for purpose of granting entry to a secure facility must operate at or near zero false acceptance of forgery in order to be assured of barring any intruder. ...
doi:10.1007/978-1-4471-2063-6_275
fatcat:azkawf5wmbdmniqglidqjviqqi
Koopman-Based Neural Lyapunov Functions for General Attractors
[article]
2022
arXiv
pre-print
forward-invariant sets under some (unknown) attractor dynamics. ...
Additionally, when the dynamics are polynomial and when neural networks are replaced by polynomials as a choice of function approximators in our approach, one can further leverage Sum-of-Squares programs ...
We shall further explore more recent developments in SOS optimization [24] , [25] in our future work on verification of Lyapunov certificates for high dimensional systems, including SMT-based verification ...
arXiv:2203.12303v1
fatcat:5i2ewwucwbfo3d4ic6phsrmn4y
Optimized Public Auditing and Data Dynamics for Data Storage Security in Cloud Computing
2016
Procedia Computer Science
We also propose a protocol to perform efficient block-level and fine-grained dynamic-data update operations on data stored on cloud using a modified Chameleon Authentication Tree. ...
In this paper, we focus on the problem of data-integrity verification(by a third party auditor) for the client's data residing on a cloud storage server(CSS). ...
This kind of optimization is obtained by using an mCAT for authentication during dynamic data update operations.
3 . 3 Upon receiving the Response, client performs the operation: Veri f yAuth: First ...
doi:10.1016/j.procs.2016.07.286
fatcat:adrp43fklvatxpk4hlzb7l4jua
« Previous
Showing results 1 — 15 out of 189,897 results