Filters








189,897 Hits in 5.2 sec

Optimal Verification of Operations on Dynamic Sets [chapter]

Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
2011 Lecture Notes in Computer Science  
We study the design of protocols for set-operation verification, namely the problem of cryptographically checking the correctness of outsourced set operations performed by an untrusted server over a dynamic  ...  Based on a novel extension of the security properties of bilinear-map accumulators as well as on a primitive called accumulation tree, our protocols achieve optimal verification and proof complexity (i.e  ...  The views in this paper do not necessarily reflect the views of the sponsors.  ... 
doi:10.1007/978-3-642-22792-9_6 fatcat:m5qm2fo3xva7bh5etqttyf5bm4

A procedure for power electronic converters design with controllability verification based on the nonlinear dynamical model

Jorge H. Urrea-Quintero, Nicolas Munoz-Galeano, Daniel A. Cuervo-Sanchez
2017 2017 IEEE Workshop on Power Electronics and Power Quality Applications (PEPQA)  
In this proposed design procedure, system controllability is tested based on set theory in control.  ...  Terms-power electronic converters, design procedure, dynamical modeling, set theory in control, controllability, controller design  ...  ACKNOWLEDGMENT Authors wish to thank the support offered by the "Estrategia de sostenibilidad 2016-2017" and "Beca Estudiante Instructor" of Universidad de Antioquia (Colombia).  ... 
doi:10.1109/pepqa.2017.7981688 fatcat:go4clpnnffbelawmvhxifzcuhq

Immutability specification and its applications

Igor Pechtchanski, Vivek Sarkar
2005 Concurrency and Computation  
Further, use of immutability information yields substantial reductions (33% to 99%) in the number of dynamic read accesses, and also measurable speedups in the range of 5% to 10% for certain benchmark  ...  Compared to a final declaration, an immutability assertion in our framework can express a richer set of immutability properties along three dimensions -lifetime, reachability and context.  ...  Acknowledgments We are grateful to Robert O'Callahan and to the anonymous reviewers for their comments on an earlier version of this paper.  ... 
doi:10.1002/cpe.853 fatcat:lnez6yolobhtpkm4mulnpab5wm

Immutability specification and its applications

Igor Pechtchanski, Vivek Sarkar
2002 Proceedings of the 2002 joint ACM-ISCOPE conference on Java Grande - JGI '02  
Further, use of immutability information yields substantial reductions (33% to 99%) in the number of dynamic read accesses, and also measurable speedups in the range of 5% to 10% for certain benchmark  ...  Compared to a final declaration, an immutability assertion in our framework can express a richer set of immutability properties along three dimensions -lifetime, reachability and context.  ...  Acknowledgments We are grateful to Robert O'Callahan and to the anonymous reviewers for their comments on an earlier version of this paper.  ... 
doi:10.1145/583810.583833 dblp:conf/java/PechtchanskiS02 fatcat:aglnlcr33rfttcbzwk4j67wpza

xTune

Minyoung Kim
2008 ACM SIGBED Review  
This thesis proposes a unified framework that employs iterative policy/parameter tuning by combining light-weight, on-the-fly formal verification with feedback for dynamic adaptation.  ...  The integration of formal analysis with dynamic behavior from system execution will result in a feedback loop that enables model refinement and further optimization of policies and parameters.  ...  These analysis results enable policy-based operation and adaptation as well as parameter setting of selected policies with quantifiable confidence.  ... 
doi:10.1145/1366283.1366307 fatcat:3cksnmaiizhprlvbl6r5ztsg7m

SRAM dynamic stability verification by reachability analysis with consideration of threshold voltage variation

Yang Song, Hao Yu, Sai Manoj Pudukotai Dinakarrao, Guoyong Shi
2013 Proceedings of the 2013 ACM international symposium on International symposium on physical design - ISPD '13  
technology scales down -Process variations, mismatch among transistors cause failures • Nonlinear dynamics of SRAM • Physical mechanisms of failures -Separatrix: boundary separating two stable regions  ...  Outline • SRAM failure analysis • SRAM nonlinear dynamicsVerification by reachability analysis • Experimental results • Summary 2 Monday, March 25, 2013 SRAM Failure Analysis • Becomes difficult as  ...  variations. • Reachability verification for SRAMs achieved good speed and precision, and can be extended for optimization nominal point on the trajectory: • One operating point in the neighborhood of  ... 
doi:10.1145/2451916.2451927 dblp:conf/ispd/SongYDS13 fatcat:jzxhtybcafg5xcd3usmgxc3chu

Dynamic Selection Of Magnitude And Phase Based Acoustic Feature Streams For Speaker Verification

Rajesh Hegde, Hema A. Murthy, Padmanabhan Rajan
2009 Zenodo  
Publication in the conference proceedings of EUSIPCO, Glasgow, Scotland, 2009  ...  N . 3: Perform vector quantisation on the set X to form a codebook C. Similarly perform vector quantisation on the set Y to form a codebook D.  ...  {Given: Training data for one speaker, consisting of N frames} 2: From the N training frames, extract the set of shorttime spectra X = {X i } and set of feature vectors (MFCC or MODGDF) Y = {Y i } where  ... 
doi:10.5281/zenodo.41710 fatcat:ntgl4xg6njbmta3acy7zlu4m7y

Control software model checking using bisimulation functions for nonlinear systems

James Kapinski, Alexandre Donze, Flavio Lerda, Hitashyam Maka, Silke Wagner, Bruce H. Krogh
2008 2008 47th IEEE Conference on Decision and Control  
The paper presents the convex optimizations required to perform control system verification using a sourcecode model checker, and the method is illustrated for an example of a supervisory control system  ...  Sets of reachable continuous states are computed using numerical simulation and bisimulation functions.  ...  The operations are used by our verification technique to compute maximally safe sublevel sets and to perform the merging operation.  ... 
doi:10.1109/cdc.2008.4739247 dblp:conf/cdc/KapinskiDLMWK08 fatcat:gxfuk2ql6nd5bpa4urbk3lulum

On-line Signature Verification Based on GA-SVM

Dong Huang, Jian Gao
2015 International Journal of Online Engineering (iJOE)  
A 27-parameter feature set including shape and dynamic features is extracted from the on-line signatures data.  ...  With the development of pen-based mobile device, on-line signature verification is gradually becoming a kind of important biometrics verification.  ...  From the collection of the original dynamic data signature extracted signature features include 27 kinds of shape and dynamic feature set, the training of the classifier as the target data.  ... 
doi:10.3991/ijoe.v11i6.5122 fatcat:uajj2jquffdvlkjx2u6nobnghe

Ongoing Work on Automated Verification of Noisy Nonlinear Systems with Ariadne [chapter]

Luca Geretti, Davide Bresolin, Pieter Collins, Sanja Zivanovic Gonzalez, Tiziano Villa
2017 Lecture Notes in Computer Science  
accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the  ...  If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the "Taverne" license above, please follow below link for the End User  ...  ., that ϕ remains true for all possible executions starting from a set X 0 of initial states, allowing to answer if a system operates within safe operating conditions expressed as a set.  ... 
doi:10.1007/978-3-319-67549-7_19 fatcat:fwl327jgrbb5rfk3yjtaaq227e

Parameter optimization for biometric fingerprint recognition using genetic algorithms

Tobias Scheidat, Andreas Engel, Claus Vielhauer
2006 Proceeding of the 8th workshop on Multimedia and security - MM&Sec '06  
For the confirmation of the results, which were found out with this test set, the databases of the Fingerprint Verification Contests of the years 2000, 2002 and 2004 were examined in addition.  ...  In this paper, we suggest an optimization approach for fingerprint authentication using genetic algorithms.  ...  The best result based on the optimized parameter set was determined on the database 1 (DB1) of the FVC 2000.  ... 
doi:10.1145/1161366.1161389 dblp:conf/mmsec/ScheidatEV06 fatcat:i5cutmcltrdurkj324koubumyy

Safety verification of reactive controllers for UAV flight in cluttered environments using barrier certificates

Andrew J. Barry, Anirudha Majumdar, Russ Tedrake
2012 2012 IEEE International Conference on Robotics and Automation  
We expect that these formal verification techniques will allow for the comparison, and ultimately optimization, of reactive controllers for robustness to varying initial conditions and environments.  ...  In contrast to previous work, we use rational functions to globally approximate non-smooth dynamics and use multiple barrier functions to guard against more than one obstacle.  ...  Previous work on mobile robots operating around polygonal obstacles often made use of cell decompositions and piecewise models of the dynamics, which can lead to very powerful and efficient planning and  ... 
doi:10.1109/icra.2012.6225351 dblp:conf/icra/BarryMT12 fatcat:uecirh22bfan3dvyydfylo5idi

Optimization of a Signature Verification System Using Neural Networks [chapter]

Luan Ling Lee, Toby Berger
1993 ICANN '93  
On the other hand, a system for purpose of granting entry to a secure facility must operate at or near zero false acceptance of forgery in order to be assured of barring any intruder.  ...  A majority rule based signature verifi.cation system employs a set of 42 personalized parameter features consisting of both dynamic and static features extracted from sampled signatures by using a graphic  ...  On the other hand, a system for purpose of granting entry to a secure facility must operate at or near zero false acceptance of forgery in order to be assured of barring any intruder.  ... 
doi:10.1007/978-1-4471-2063-6_275 fatcat:azkawf5wmbdmniqglidqjviqqi

Koopman-Based Neural Lyapunov Functions for General Attractors [article]

Shankar A. Deka, Alonso M. Valle, Claire J. Tomlin
2022 arXiv   pre-print
forward-invariant sets under some (unknown) attractor dynamics.  ...  Additionally, when the dynamics are polynomial and when neural networks are replaced by polynomials as a choice of function approximators in our approach, one can further leverage Sum-of-Squares programs  ...  We shall further explore more recent developments in SOS optimization [24] , [25] in our future work on verification of Lyapunov certificates for high dimensional systems, including SMT-based verification  ... 
arXiv:2203.12303v1 fatcat:5i2ewwucwbfo3d4ic6phsrmn4y

Optimized Public Auditing and Data Dynamics for Data Storage Security in Cloud Computing

Anirudha Pratap Singh, Syam Kumar Pasupuleti
2016 Procedia Computer Science  
We also propose a protocol to perform efficient block-level and fine-grained dynamic-data update operations on data stored on cloud using a modified Chameleon Authentication Tree.  ...  In this paper, we focus on the problem of data-integrity verification(by a third party auditor) for the client's data residing on a cloud storage server(CSS).  ...  This kind of optimization is obtained by using an mCAT for authentication during dynamic data update operations. 3 . 3 Upon receiving the Response, client performs the operation: Veri f yAuth: First  ... 
doi:10.1016/j.procs.2016.07.286 fatcat:adrp43fklvatxpk4hlzb7l4jua
« Previous Showing results 1 — 15 out of 189,897 results