27,667 Hits in 7.2 sec

Interval-valued symbolic representation based method for off-line signature verification

Srikanta Pal, Alireza Alaei, Umapada Pal, Michael Blumenstein
2015 2015 International Joint Conference on Neural Networks (IJCNN)  
The objective of this investigation is to present an interval-symbolic representation based method for offline signature verification.  ...  Concerning this large Hindi signature dataset, the highest verification accuracy of 91.83% was obtained on a joint feature set considering all four sets of features, while 2.5%, 13.84% and 8.17% of FAR  ...  The same datasets and feature sets used for training and testing in the proposed interval-symbolic representation method were employed for training and testing of the PNN.  ... 
doi:10.1109/ijcnn.2015.7280518 dblp:conf/ijcnn/PalAPB15 fatcat:ngw4pt443fg47ly2lf62kxxbfu

Complexity effects on end user understanding of data models : An experimental comparison of large data model representation methods

Daniel L. Moody
2002 European Conference on Information Systems  
By reducing a data model to "chunks" of manageable size, both comprehension and verification performance can be significantly improved.  ...  the data model and a set of user requirements in textual form.  ...  Only one previous experimental study has used verification to test understanding of data models (Kim and March, 1995) .  ... 
dblp:conf/ecis/Moody02 fatcat:twb6ivrx7zhhzotawyen2givri

Harnessing Unrecognizable Faces for Improving Face Recognition [article]

Siqi Deng, Yuanjun Xiong, Meng Wang, Wei Xia, Stefano Soatto
2021 arXiv   pre-print
The common implementation of face recognition systems as a cascade of a detection stage and a recognition or verification stage can cause problems beyond failures of the detector.  ...  We show that accounting for recognizability reduces error rate of single-image face recognition by 58% at FAR=1e-5 on the IJB-C Covariate Verification benchmark, and reduces verification error rate by  ...  ("indian" and "other" not tested due to insufficient number of images.)Table 10. Templated-based face verification test on YoutubeFaces benchmark.  ... 
arXiv:2106.04112v2 fatcat:qzbtf2ude5e35moocl4cp3awdi

Model checker execution reports

Rodrigo Castano, Victor Braberman, Diego Garbervetsky, Sebastian Uchitel
2017 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE)  
We characterize the information that model checkers themselves can provide, in terms of analyzed traces, i.e. sequences of statements, and safe cones, and present the notion of execution reports (ERs),  ...  We evaluate our approach empirically and provide examples to illustrate the ERs produced and the information that can be extracted.  ...  One of the use cases of these annotations is to complement the verification efforts and produce a small test suite.  ... 
doi:10.1109/ase.2017.8115633 dblp:conf/kbse/CastanoBGU17 fatcat:ojxtczmaunaytaag2zra5vulke

Face authentication test on the BANCA database

K. Messer, J. Kittler, M. Sadeghi, M. Hamouz, A. Kostin, F. Cardinaux, S. Marcel, S. Bengio, C. Sanderson, N. Poh, Y. Rodriguez, J. Czyz (+27 others)
2004 Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004.  
This paper details the results of a Face Authentication Test (FAT2004) [5] held in conjunction with the 17th International Conference on Pattern Recognition.  ...  The competition also had a sequestered part in which insti-tutions had to submit their algorithms for independent testing. 13 different verification algorithms from 10 institutions submitted results.  ...  The entrants were asked to submit the Weighted Error Rate (W ER) for the test data of groups G1 and G2 at the three different values of R.  ... 
doi:10.1109/icpr.2004.1333826 dblp:conf/icpr/MesserKSHKCMBSCVMLSCPVBSWYHHHMTMWWXMYFDLGSPR04 fatcat:jg2sil6plndcdat5qxntvfwc2m

Influences of Cognitive Processing Capacities on Speech Perception in Young Adults

Lily Tao, Marcus Taft
2017 Frontiers in Psychology  
to manage the activation of incorrect competing representations and shifting to other possible matches.  ...  These findings suggest that stronger abilities in aspects of cognitive functioning may be helpful for matching variable pronunciations of speech sounds to stored representations, for example by being able  ...  ACKNOWLEDGMENTS The data reported in this work first appeared in the dissertation of LT (Tao, 2015) .  ... 
doi:10.3389/fpsyg.2017.00266 pmid:28286491 pmcid:PMC5323404 fatcat:oo4uvcqnencxzjdic3srspdflm

Regularized Kernel Discriminant Analysis With a Robust Kernel for Face Recognition and Verification

S. Zafeiriou, G. Tzimiropoulos, M. Petrou, T. Stathaki
2012 IEEE Transactions on Neural Networks and Learning Systems  
We propose a robust approach to discriminant kernel-based feature extraction for face recognition and verification.  ...  We applied the proposed framework to several popular databases (Yale, AR, XM2VTS) and achieved state-of-the-art performance for most of our experiments.  ...  XM2VTS Database We carried out face verification experiments on the test set of Configuration I of the XM2VTS database.  ... 
doi:10.1109/tnnls.2011.2182058 pmid:24808557 fatcat:277esc2wmvglth3t43xanpklzm

Generation of a pictorial code

Philip H. K. Seymour
1974 Memory & Cognition  
Construction latencies were shorter in response to pictures than sentences, and there were effects of sentence form on verification time. Some implications of these results arediscussed.  ...  In Experiment III, Ss matched pictures or sentences against a test picture under conditions of simultaneous or successive presentation.  ...  In the case of verification, S must set up a TOTE for scanning and testing of the contours of the test picture.  ... 
doi:10.3758/bf03208987 pmid:24214746 fatcat:kyt6hnz7kfbcfp33jegdub526e

Privacy-Preserving Adversarial Representation Learning in ASR: Reality or Illusion?

Brij Mohan Lal Srivastava, Aurélien Bellet, Marc Tommasi, Emmanuel Vincent
2019 Interspeech 2019  
Through speaker identification and verification experiments on the Librispeech corpus with open and closed sets of speakers, we show that the representations obtained from a standard architecture still  ...  In this paper, we focus on the protection of speaker identity and study the extent to which users can be recognized based on the encoded representation of their speech as obtained by a deep encoder-decoder  ...  ., speak-ers are Table 3 : 3 ASR and speaker recognition results with different representations. WER (%) is reported on test-clean set, ACC (%) on test-adv set and EER (%) on test-clean-trial.  ... 
doi:10.21437/interspeech.2019-2415 dblp:conf/interspeech/SrivastavaBTV19 fatcat:poxxcsqvcfcv5flrzwaz6fxxzm

System testing using use cases for simulation model of an emergency room

Guodong Shao
2011 International Journal of Advanced Intelligence Paradigms  
This paper identified the needs of system testing using specifications for M&S applications for DHS applications and providing a novel approach of Verification, Validation and Testing (VV&T) for DHS M&  ...  Functional system test requirements and testing criteria of the ER model were discussed.  ...  Testing is conducted to perform validation and verification.  ... 
doi:10.1504/ijaip.2011.039743 fatcat:k3ktscpd5raqjbshahfiu52emy

Pixelwise Local Binary Pattern Models of Faces Using Kernel Density Estimation [chapter]

Timo Ahonen, Matti Pietikäinen
2009 Lecture Notes in Computer Science  
They have been successfully used in face detection, recognition, verification, facial expression recognition etc.  ...  In this work we propose a novel, spatially more precise model, based on kernel density estimation of local LBP distributions.  ...  Abdenour Hadid for helpful comments in preparation of the manuscript.  ... 
doi:10.1007/978-3-642-01793-3_6 fatcat:mj4l2x3clbaona3mf3ysseqbbu

Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study

Le Qin, Fei Peng, Min Long, Raghavendra Ramachandra, Christoph Busch
2022 ACM Transactions on Privacy and Security  
to face verification and PAD systems compared with the print, replay, and mask PAs.  ...  Moreover, the generalization ability of the proposed PA and the vulnerability analysis with regard to commercial systems are also investigated by evaluating unknown face verification and real-world PAD  ...  of F PAD , F PAD (•) > th PAD means an attack presentation F V ER face verification module of the system th V ER threshold of face verification F V ER (•, •) output score of F V ER , F V ER (•, •) > th  ... 
doi:10.1145/3491199 dblp:journals/tissec/QinPLRB22 fatcat:aawxqvdednbgdjnoyhcm5ouz6e

Advanced Saturation-based Model Checking of Well-formed Coloured Petri Nets

András Vörös, Dániel Darvas, Attila Jámbor, Tamás Bartha
2014 Periodica Polytechnica Electrical Engineering and Computer Science  
We examine an industrial case study for our algorithm: the verification of a safety function. The description of the verification process and our results are given in Section 5.  ...  We address this problem by introducing a new strategy to handle the complex logic and large local state spaces encoded in the next-state representation of well-formed coloured Petri nets.  ...  In this section we introduce its main features and its application for the verification of CPN models.  ... 
doi:10.3311/ppee.2080 fatcat:qwfrj5zz45gpbo2esqkn5ribjy

Predicting Rankings of Software Verification Competitions [article]

Mike Czech, Eyke Hüllermeier, Marie-Christine Jakobs, Heike Wehrheim
2017 arXiv   pre-print
Our kernels employ a graph representation for software source code that mixes elements of control flow and program dependence graphs with abstract syntax trees.  ...  Software verification competitions, such as the annual SV-COMP, evaluate software verification tools with respect to their effectivity and efficiency.  ...  Table 1 lists some identi ers and their meaning. e following de nition formalizes this graph representation. 3 De nition 2.2.  ... 
arXiv:1703.00757v1 fatcat:rk4hob6lhjdmtfzdjf4ce4bdxe

A Framework for Defining and Verifying Clinical Guidelines: A Case Study on Cancer Screening [chapter]

Federico Chesani, Pietro De Matteis, Paola Mello, Marco Montali, Sergio Storari
2006 Lecture Notes in Computer Science  
Medical guidelines are clinical behaviour recommendations used to help and support physicians in the definition of the most appropriate diagnosis and/or therapy within determinate clinical circumstances  ...  In this paper we present the GPROVE framework that we are developing within a regional project to describe medical guidelines in a visual way and to automatically perform the conformance verification.  ...  This work has been partially supported by NOEMALIFE under the regional PRRITT project "Screening PRotocol INtelligent Government (SPRING)" and by the PRIN 2005 project "Specification and verification of  ... 
doi:10.1007/11875604_39 fatcat:yr3awzh57rdkxavjt6did4irza
« Previous Showing results 1 — 15 out of 27,667 results