A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Interval-valued symbolic representation based method for off-line signature verification
2015
2015 International Joint Conference on Neural Networks (IJCNN)
The objective of this investigation is to present an interval-symbolic representation based method for offline signature verification. ...
Concerning this large Hindi signature dataset, the highest verification accuracy of 91.83% was obtained on a joint feature set considering all four sets of features, while 2.5%, 13.84% and 8.17% of FAR ...
The same datasets and feature sets used for training and testing in the proposed interval-symbolic representation method were employed for training and testing of the PNN. ...
doi:10.1109/ijcnn.2015.7280518
dblp:conf/ijcnn/PalAPB15
fatcat:ngw4pt443fg47ly2lf62kxxbfu
Complexity effects on end user understanding of data models : An experimental comparison of large data model representation methods
2002
European Conference on Information Systems
By reducing a data model to "chunks" of manageable size, both comprehension and verification performance can be significantly improved. ...
the data model and a set of user requirements in textual form. ...
Only one previous experimental study has used verification to test understanding of data models (Kim and March, 1995) . ...
dblp:conf/ecis/Moody02
fatcat:twb6ivrx7zhhzotawyen2givri
Harnessing Unrecognizable Faces for Improving Face Recognition
[article]
2021
arXiv
pre-print
The common implementation of face recognition systems as a cascade of a detection stage and a recognition or verification stage can cause problems beyond failures of the detector. ...
We show that accounting for recognizability reduces error rate of single-image face recognition by 58% at FAR=1e-5 on the IJB-C Covariate Verification benchmark, and reduces verification error rate by ...
("indian" and "other" not tested due to insufficient number of images.)Table 10. Templated-based face verification test on YoutubeFaces benchmark. ...
arXiv:2106.04112v2
fatcat:qzbtf2ude5e35moocl4cp3awdi
Model checker execution reports
2017
2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE)
We characterize the information that model checkers themselves can provide, in terms of analyzed traces, i.e. sequences of statements, and safe cones, and present the notion of execution reports (ERs), ...
We evaluate our approach empirically and provide examples to illustrate the ERs produced and the information that can be extracted. ...
One of the use cases of these annotations is to complement the verification efforts and produce a small test suite. ...
doi:10.1109/ase.2017.8115633
dblp:conf/kbse/CastanoBGU17
fatcat:ojxtczmaunaytaag2zra5vulke
Face authentication test on the BANCA database
2004
Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004.
This paper details the results of a Face Authentication Test (FAT2004) [5] held in conjunction with the 17th International Conference on Pattern Recognition. ...
The competition also had a sequestered part in which insti-tutions had to submit their algorithms for independent testing. 13 different verification algorithms from 10 institutions submitted results. ...
The entrants were asked to submit the Weighted Error Rate (W ER) for the test data of groups G1 and G2 at the three different values of R. ...
doi:10.1109/icpr.2004.1333826
dblp:conf/icpr/MesserKSHKCMBSCVMLSCPVBSWYHHHMTMWWXMYFDLGSPR04
fatcat:jg2sil6plndcdat5qxntvfwc2m
Influences of Cognitive Processing Capacities on Speech Perception in Young Adults
2017
Frontiers in Psychology
to manage the activation of incorrect competing representations and shifting to other possible matches. ...
These findings suggest that stronger abilities in aspects of cognitive functioning may be helpful for matching variable pronunciations of speech sounds to stored representations, for example by being able ...
ACKNOWLEDGMENTS The data reported in this work first appeared in the dissertation of LT (Tao, 2015) . ...
doi:10.3389/fpsyg.2017.00266
pmid:28286491
pmcid:PMC5323404
fatcat:oo4uvcqnencxzjdic3srspdflm
Regularized Kernel Discriminant Analysis With a Robust Kernel for Face Recognition and Verification
2012
IEEE Transactions on Neural Networks and Learning Systems
We propose a robust approach to discriminant kernel-based feature extraction for face recognition and verification. ...
We applied the proposed framework to several popular databases (Yale, AR, XM2VTS) and achieved state-of-the-art performance for most of our experiments. ...
XM2VTS Database We carried out face verification experiments on the test set of Configuration I of the XM2VTS database. ...
doi:10.1109/tnnls.2011.2182058
pmid:24808557
fatcat:277esc2wmvglth3t43xanpklzm
Generation of a pictorial code
1974
Memory & Cognition
Construction latencies were shorter in response to pictures than sentences, and there were effects of sentence form on verification time. Some implications of these results arediscussed. ...
In Experiment III, Ss matched pictures or sentences against a test picture under conditions of simultaneous or successive presentation. ...
In the case of verification, S must set up a TOTE for scanning and testing of the contours of the test picture. ...
doi:10.3758/bf03208987
pmid:24214746
fatcat:kyt6hnz7kfbcfp33jegdub526e
Privacy-Preserving Adversarial Representation Learning in ASR: Reality or Illusion?
2019
Interspeech 2019
Through speaker identification and verification experiments on the Librispeech corpus with open and closed sets of speakers, we show that the representations obtained from a standard architecture still ...
In this paper, we focus on the protection of speaker identity and study the extent to which users can be recognized based on the encoded representation of their speech as obtained by a deep encoder-decoder ...
., speak-ers are
Table 3 : 3 ASR and speaker recognition results with different representations. WER (%) is reported on test-clean set, ACC (%) on test-adv set and EER (%) on test-clean-trial. ...
doi:10.21437/interspeech.2019-2415
dblp:conf/interspeech/SrivastavaBTV19
fatcat:poxxcsqvcfcv5flrzwaz6fxxzm
System testing using use cases for simulation model of an emergency room
2011
International Journal of Advanced Intelligence Paradigms
This paper identified the needs of system testing using specifications for M&S applications for DHS applications and providing a novel approach of Verification, Validation and Testing (VV&T) for DHS M& ...
Functional system test requirements and testing criteria of the ER model were discussed. ...
Testing is conducted to perform validation and verification. ...
doi:10.1504/ijaip.2011.039743
fatcat:k3ktscpd5raqjbshahfiu52emy
Pixelwise Local Binary Pattern Models of Faces Using Kernel Density Estimation
[chapter]
2009
Lecture Notes in Computer Science
They have been successfully used in face detection, recognition, verification, facial expression recognition etc. ...
In this work we propose a novel, spatially more precise model, based on kernel density estimation of local LBP distributions. ...
Abdenour Hadid for helpful comments in preparation of the manuscript. ...
doi:10.1007/978-3-642-01793-3_6
fatcat:mj4l2x3clbaona3mf3ysseqbbu
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study
2022
ACM Transactions on Privacy and Security
to face verification and PAD systems compared with the print, replay, and mask PAs. ...
Moreover, the generalization ability of the proposed PA and the vulnerability analysis with regard to commercial systems are also investigated by evaluating unknown face verification and real-world PAD ...
of F PAD , F PAD (•) > th PAD means an attack presentation F V ER face verification module of the system th V ER threshold of face verification F V ER (•, •) output score of F V ER , F V ER (•, •) > th ...
doi:10.1145/3491199
dblp:journals/tissec/QinPLRB22
fatcat:aawxqvdednbgdjnoyhcm5ouz6e
Advanced Saturation-based Model Checking of Well-formed Coloured Petri Nets
2014
Periodica Polytechnica Electrical Engineering and Computer Science
We examine an industrial case study for our algorithm: the verification of a safety function. The description of the verification process and our results are given in Section 5. ...
We address this problem by introducing a new strategy to handle the complex logic and large local state spaces encoded in the next-state representation of well-formed coloured Petri nets. ...
In this section we introduce its main features and its application for the verification of CPN models. ...
doi:10.3311/ppee.2080
fatcat:qwfrj5zz45gpbo2esqkn5ribjy
Predicting Rankings of Software Verification Competitions
[article]
2017
arXiv
pre-print
Our kernels employ a graph representation for software source code that mixes elements of control flow and program dependence graphs with abstract syntax trees. ...
Software verification competitions, such as the annual SV-COMP, evaluate software verification tools with respect to their effectivity and efficiency. ...
Table 1 lists some identi ers and their meaning. e following de nition formalizes this graph representation. 3 De nition 2.2. ...
arXiv:1703.00757v1
fatcat:rk4hob6lhjdmtfzdjf4ce4bdxe
A Framework for Defining and Verifying Clinical Guidelines: A Case Study on Cancer Screening
[chapter]
2006
Lecture Notes in Computer Science
Medical guidelines are clinical behaviour recommendations used to help and support physicians in the definition of the most appropriate diagnosis and/or therapy within determinate clinical circumstances ...
In this paper we present the GPROVE framework that we are developing within a regional project to describe medical guidelines in a visual way and to automatically perform the conformance verification. ...
This work has been partially supported by NOEMALIFE under the regional PRRITT project "Screening PRotocol INtelligent Government (SPRING)" and by the PRIN 2005 project "Specification and verification of ...
doi:10.1007/11875604_39
fatcat:yr3awzh57rdkxavjt6did4irza
« Previous
Showing results 1 — 15 out of 27,667 results