Works matching DE "EXPERT computer system verification"
Results: 27
A Remote Authentication System Using Fingerprints.
- Published in:
- International Journal of Image & Graphics, 2003, v. 3, n. 3, p. 425, doi. 10.1142/S0219467803001093
- By:
- Publication type:
- Article
Sorted Index Numbers for Privacy Preserving Face Recognition.
- Published in:
- EURASIP Journal on Advances in Signal Processing, 2009, p. 1, doi. 10.1155/2009/260148
- By:
- Publication type:
- Article
Strict error bounds for linear solid mechanics problems using a subdomain-based flux-free method.
- Published in:
- Computational Mechanics, 2009, v. 44, n. 4, p. 533, doi. 10.1007/s00466-009-0388-1
- By:
- Publication type:
- Article
Verification of Uncertain Knowledge-based Systems: An Empirical Verification Approach.
- Published in:
- 1996
- By:
- Publication type:
- Product Review
An Interval Logic for Real-Time System Specification.
- Published in:
- IEEE Transactions on Software Engineering, 2001, v. 27, n. 3, p. 208, doi. 10.1109/32.910858
- By:
- Publication type:
- Article
Extraction of media and plaque boundaries in intravascular ultrasound images by level sets and min/max flow.
- Published in:
- Expert Systems, 2010, v. 27, n. 2, p. 101, doi. 10.1111/j.1468-0394.2010.00510.x
- By:
- Publication type:
- Article
Estimation of Frequency Characteristics of Super-Narrow Band Digital Filters.
- Published in:
- Electronics & Electrical Engineering, 2007, n. 77, p. 69
- By:
- Publication type:
- Article
SVD-BASED SIGNATURE VERIFICATION TECHNIQUE USING DATA GLOVE.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2008, v. 22, n. 3, p. 431, doi. 10.1142/S0218001408006387
- By:
- Publication type:
- Article
ENDL: A Logical Framework for Verifying Secure Transaction Protocols.
- Published in:
- Knowledge & Information Systems, 2005, v. 7, n. 1, p. 84, doi. 10.1007/s10115-003-0127-4
- By:
- Publication type:
- Article
Compositional Verification of Knowledge-Based Task Models and Problem-Solving Methods.
- Published in:
- Knowledge & Information Systems, 2003, v. 5, n. 3, p. 337, doi. 10.1007/s10115-002-0083-4
- By:
- Publication type:
- Article
Signature authentication based on human intervention: performance and complementarity with automatic systems.
- Published in:
- IET Biometrics (Wiley-Blackwell), 2017, v. 6, n. 4, p. 307, doi. 10.1049/iet-bmt.2016.0115
- By:
- Publication type:
- Article
The expert evaluation by the use of group of experts with established competence of the state of inductance measurements.
- Published in:
- Metallurgical & Mining Industry, 2016, n. 11, p. 84
- By:
- Publication type:
- Article
Development of a Face Verification System for a Home Service Robot.
- Published in:
- Advanced Robotics, 2008, v. 22, n. 6/7, p. 749, doi. 10.1163/156855308X305308
- By:
- Publication type:
- Article
Verification of multiple agent knowledge-based systems.
- Published in:
- International Journal of Intelligent Systems, 2001, v. 16, n. 3, p. 361, doi. 10.1002/1098-111X(200103)16:3<361::AID-INT1012>3.0.CO;2-H
- By:
- Publication type:
- Article
Special issue on verification and validation issues in databases, knowledge-based systems, and ontologies.
- Published in:
- International Journal of Intelligent Systems, 2001, v. 16, n. 3, p. 263, doi. 10.1002/1098-111X(200103)16:3<263::AID-INT1006>3.0.CO;2-5
- By:
- Publication type:
- Article
Toward a Theory of Verification and Validation: Artifacts.
- Published in:
- International Journal of Intelligent Systems, 1994, v. 9, n. 9, p. 853, doi. 10.1002/int.4550090906
- By:
- Publication type:
- Article
A SET OF REFACTORING RULES FOR UML-B SPECIFICATIONS.
- Published in:
- Computing & Informatics, 2016, v. 35, n. 2, p. 411
- By:
- Publication type:
- Article
Desarrollo de un sistema experto para ayudar a la verificación del sistema "TACAN".
- Published in:
- DYNA - Ingeniería e Industria, 2014, v. 89, n. 1, p. 112, doi. 10.6036/5756
- By:
- Publication type:
- Article
SAV4AV: securing authentication and verification for ad hoc vehicles.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 4, p. 626, doi. 10.1002/sec.1011
- By:
- Publication type:
- Article
Fuzzy Rule-Based Expert System for Determining Trustworthiness of Cloud Service Providers.
- Published in:
- International Journal of Fuzzy Systems, 2017, v. 19, n. 2, p. 338, doi. 10.1007/s40815-016-0149-1
- By:
- Publication type:
- Article
Anonymous signer verifiable encrypted signature from bilinear pairing.
- Published in:
- Control & Cybernetics, 2009, v. 38, n. 3, p. 705
- By:
- Publication type:
- Article
Modular formal verification of specifications of concurrent systems.
- Published in:
- Software Testing: Verification & Reliability, 2008, v. 18, n. 1, p. 5, doi. 10.1002/stvr.371
- By:
- Publication type:
- Article
Priority based list scheduling for sabotage-tolerance with deadline tasks in desktop grids.
- Published in:
- Computer Systems Science & Engineering, 2008, v. 23, n. 2, p. 121
- By:
- Publication type:
- Article
Abstraction-Carrying Code: a Model for Mobile Code Safety.
- Published in:
- New Generation Computing, 2008, v. 26, n. 2, p. 171, doi. 10.1007/s00354-008-0039-7
- By:
- Publication type:
- Article
Verification of clocked and hybrid systems.
- Published in:
- Acta Informatica, 2000, v. 36, n. 11, p. 837, doi. 10.1007/s002360050177
- By:
- Publication type:
- Article
Provably Secure and Pairing-Based Strong Designated Verifier Signature Scheme with Message Recovery.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2015, v. 40, n. 4, p. 1069, doi. 10.1007/s13369-015-1568-2
- By:
- Publication type:
- Article
Knowledge Base Decomposition to Facilitate Verification.
- Published in:
- Information Systems Research, 2000, v. 11, n. 3, p. 260, doi. 10.1287/isre.11.3.260.12207
- By:
- Publication type:
- Article