Academic literature on the topic 'Author verification'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Author verification.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Author verification"

1

Halteren, Hans Van. "Author verification by linguistic profiling." ACM Transactions on Speech and Language Processing 4, no. 1 (January 2007): 1–17. http://dx.doi.org/10.1145/1187415.1187416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Simonova, Natalia S. "An International Verifi cation Institute as an Element of the Mechanism of Ensuring for Meeting Commitments under International Treaties." Moscow Journal of International Law, no. 1 (March 30, 2014): 82–102. http://dx.doi.org/10.24833/0869-0049-2014-1-82-102.

Full text
Abstract:
The article deals with the explanation of an international verification’s nature as a specific type of international legal relationship. An author critically analyses domestic and foreign doctrines as well as the international treaties’ practice concerning the issues of international verification. An international verification institute is quite well-searched in the international law science. But the article author considers that traditional approaches to analysis of the international verification essence (investigation of subjects, matters and aims) are not sufficient. Practical value of this article flows from the new vision of the international verification as a specific international legal relationship. The legal matter, subjects and substance of the international verification are suggested to be searched in the article.
APA, Harvard, Vancouver, ISO, and other styles
3

Fang, Yong, Yue Yang, and Cheng Huang. "EmailDetective: An Email Authorship Identification And Verification Model." Computer Journal 63, no. 11 (July 13, 2020): 1775–87. http://dx.doi.org/10.1093/comjnl/bxaa059.

Full text
Abstract:
Abstract Emails are often used to illegal cybercrime today, so it is important to verify the identity of the email author. This paper proposes a general model for solving the problem of anonymous email author attribution, which can be used in email authorship identification and email authorship verification. The first situation is to find the author of an anonymous email among the many suspected targets. Another situation is to verify if an email was written by the sender. This paper extracts features from the email header and email body and analyzes the writing style and other behaviors of email authors. The behaviors of email authors are extracted through a statistical algorithm from email headers. Moreover, the author’s writing style in the email body is extracted by a sequence-to-sequence bidirectional long short-term memory (BiLSTM) algorithm. This model combines multiple factors to solve the problem of anonymous email author attribution. The experiments proved that the accuracy and other indicators of proposed model are better than other methods. In email authorship verification experiment, our average accuracy, average recall and average F1-score reached 89.9%. In email authorship identification experiment, our model’s accuracy rate is 98.9% for 10 authors, 92.9% for 25 authors and 89.5% for 50 authors.
APA, Harvard, Vancouver, ISO, and other styles
4

Potha, Nektaria, and Efstathios Stamatatos. "Improved algorithms for extrinsic author verification." Knowledge and Information Systems 62, no. 5 (October 8, 2019): 1903–21. http://dx.doi.org/10.1007/s10115-019-01408-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lazić, Ranko. "Verification Column." ACM SIGLOG News 9, no. 4 (October 2022): 26. http://dx.doi.org/10.1145/3583660.3583665.

Full text
Abstract:
In this article, the author takes us in a masterful and engaging manner from the basics of stochastic games to the cutting-edge work on them in the verification community. I expect it will quickly become a widely used reference.
APA, Harvard, Vancouver, ISO, and other styles
6

Пинчук, Л. В. "The definition and features of on-site verification of testimony." Surgut State University Journal 12, no. 1 (2024): 105–12. http://dx.doi.org/10.35266/2949-3455-2024-1-11.

Full text
Abstract:
The article is devoted to the clarification of specific features of on-site testimony. The author substantiates the idea that the concept of on-site testimony verification and its features can be established by analyzing the legal literature on the issue and its legislative regulation, as well as by the materials of judicial practice. The author summarized new material on the topic in question: examples from court practice from 2012, studies of domestic authors since 2003. A comprehensive use of this investigative procedure in inspecting road traffic offenses was proposed. The author analyzed the available points of view in the literature and judicial practice materials, listed features of on-site testimony verification, and gave a definition of the concept of on-site testimony verification.
APA, Harvard, Vancouver, ISO, and other styles
7

Castillo, Esteban, Ofelia Cervantes, and Darnes Vilari. "Author verification using a Graph-based Representation." International Journal of Computer Applications 123, no. 14 (August 18, 2015): 1–8. http://dx.doi.org/10.5120/ijca2015905654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Potha, Nektaria, and Efstathios Stamatatos. "Improving author verification based on topic modeling." Journal of the Association for Information Science and Technology 70, no. 10 (March 7, 2019): 1074–88. http://dx.doi.org/10.1002/asi.24183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bytchkov, V. "The IAEA verification activity." Pathways to Peace and Security, no. 2 (2022): 245–62. http://dx.doi.org/10.20542/2307-1494-2022-2-245-262.

Full text
Abstract:
The article explores the verification activity by the International Atomic Energy Agency (IAEA). This activity involves three key aspects: the legal framework, goals, and measures and verification procedures to achieve these goals. The author analyzes legal and technical aspects of the IAEA verification activity, including the notions of diversion of nuclear material and a state’s noncompliance with its commitments related to corresponding safeguards agreements. The analysis is based on the systematic approach that takes into account the evolution of the safeguards system. The author proposes an original approach to reduce the risks of politicization of decisions on noncompliance of states with safeguards agreements by specifying the main notions related to the system of safeguards.
APA, Harvard, Vancouver, ISO, and other styles
10

Ostapenko, Oleksiy, and Iryna Shulhan. "Verification – as a form of legal support for the mobilization of ukrainian citizens under martial law." Visnik Nacional’nogo universitetu «Lvivska politehnika». Seria: Uridicni nauki 10, no. 40 (December 18, 2023): 143–54. http://dx.doi.org/10.23939/law2023.40.143.

Full text
Abstract:
The protection of state sovereignty and territorial integrity of Ukraine is one of the constitutional duties of citizens. Under the legal regime of martial law, administrative and legal means of conducting a balanced State policy on mobilization, and creating an appropriate human resources potential for the protection of the State sovereignty and territorial value of Ukraine are of particular importance. The authors of the article state that verification of a citizen's identity documents is one of the means of clarifying and establishing the identity of a citizen by authorized officials of state authorities, local self-government and military administration, in particular, by the Territorial Centers for Recruitment and Social Support. Regulatory legal acts of Ukraine regulate the relations arising in the course of verification of citizens' identity and provide for supervision/control over compliance with the law by officials authorized to carry out the verification. The authors of the study aimed to identify the causes and conditions that lead to conflicts during the verification of documents under the legal regime of martial law by military officials of the Territorial Recruitment and Social Support Centers. The authors emphasize that the legal means of resolving conflicts arising during the verification should be enshrined in the substantive and procedural rules of administrative law. The author emphasizes that a compromise is a possibility of reaching a full agreement during the verification of an individual's documents. The author proposes a list of cases where a compromise may be reached between the parties to the document verification. It is noted that the use of physical force, special means or weapons is an extreme measure which is allowed in exceptional cases and in accordance with the procedure clearly defined by law.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Author verification"

1

Hammoud, Khodor. "Trust in online data : privacy in text, and semantic-based author verification in micro-messages." Electronic Thesis or Diss., Université Paris Cité, 2021. http://www.theses.fr/2021UNIP5203.

Full text
Abstract:
De nombreux problèmes émanent de la diffusion et l'utilisation des données sur les réseaux sociaux. Il est nécessaire de promouvoir la confiance sur les plateformes sociales, quant au partage et l’utilisation des données. Les données en ligne sont principalement sous forme textuelle, ce qui pose des problèmes aux solutions d'automatisation en raison de la richesse du langage naturel. De plus, l'utilisation des micro-messages comme principal moyen de communication sur les médias sociaux rend le problème beaucoup plus difficile en raison de la rareté des fonctionnalités à analyser par corps de texte. Nos expériences montrent que les solutions d'anonymat des données ne peuvent pas préserver l'anonymat des utilisateurs sans sacrifier la qualité des données. De plus, dans le domaine de la vérification d'auteur, étant donné un ensemble de documents dont l'auteur est connu, nous avons constaté très peu de travaux de recherche travaillant sur les micro-messages. Nous avons également remarqué que l'état de l'art ne prend pas en considération la sémantique des textes, les rendant vulnérables aux attaques par usurpation d'identité. Motivés par ces résultats, nous consacrons cette thèse pour aborder les tâches de (1) identifier les problèmes actuels avec l'anonymat des données utilisateur dans le texte, et fournir une première approche sémantique originale pour résoudre ce problème, (2) étudier la vérification de l'auteur en micro -messages, et développer une nouvelle approche basée sur la sémantique pour résoudre ces défis, et (3) étudier l'effet de l'inclusion de la sémantique dans la gestion des attaques de manipulation, (4) étudier l'effet temporel des données, où les auteurs pourraient avoir changer d'avis au fil du temps. La première partie de la thèse se concentre sur l'anonymat des utilisateurs dans les données textuelles sur les réseaux sociaux, dans le but d'anonymiser les informations personnelles des données des utilisateurs en ligne pour une analyse sécurisée des données sans compromettre la confidentialité des utilisateurs. Nous présentons une première approche basée sur la sémantique, qui peut être personnalisée pour équilibrer la préservation de la qualité des données et la maximisation de l'anonymat de l'utilisateur en fonction de l'application à portée de main. Dans la deuxième partie, nous étudions la vérification d'auteur dans les micro-messages sur les réseaux sociaux. Nous confirmons le manque de recherche en vérification d'auteur sur les micro-messages, et nous montrons que l'état de l'art ne fonctionne pas bien lorsqu'il est appliqué sur des micro-messages. Ensuite, nous présentons une nouvelle approche basée sur la sémantique qui utilise des inclusions de mots et une analyse des sentiments pour collecter l'historique des opinions de l'auteur afin de déterminer l'exactitude de la revendication de paternité et montrer ses performances concurrentielles sur les micro-messages. Nous utilisons ces résultats dans la troisième partie de la thèse pour améliorer encore notre approche. Nous construisons un ensemble de données composé des tweets des 88 influenceurs Twitter les plus suivis. Nous l'utilisons pour montrer que l'état de l'art n'est pas capable de gérer les attaques d'usurpation d'identité, modifiant le message derrière le tweet, tandis que le modèle d'écriture est préservé. D'autre part, puisque notre approche est consciente de la sémantique du texte, elle est capable de détecter les manipulations de texte avec une précision supérieure à 90%. Et dans la quatrième partie de la thèse, nous analysons l'effet temporel des données sur notre approche de vérification d'auteur.Nous étudions l'évolution des opinions des auteurs au fil du temps et comment s'en accommoder dans notre approche. Nous étudions les tendances des sentiments d'un auteur pour un sujet spécifique sur une période de temps et prédisons les fausses allégations de paternité en fonction de la période dans laquelle se situe la revendication
Many Problems surround the spread and use of data on social media. There is a need to promote trust on social platforms, regarding the sharing and consumption of data. Data online is mostly in textual form which poses challenges for automation solutions because of the richness of natural language. In addition, the use of micro-messages as the main means of communication on social media makes the problem much more challenging because of the scarceness of features to analyze per body of text. Our experiments show that data anonymity solutions cannot preserve user anonymity without sacrificing data quality. In addition, in the field of author verification, which is the problem of determining if a body of text was written by a specific person or not, given a set of documents known to be authored by them, we found a lack of research working with micro-messages. We also noticed that the state-of-the-art does not take text semantics into consideration, making them vulnerable to impersonation attacks. Motivated by these findings, we devote this thesis to tackle the tasks of (1) identifying the current problems with user data anonymity in text, and provide an initial novel semantic-based approach to tackle this problem, (2) study author verification in micro-messages and identify the challenges in this field, and develop a novel semantics-based approach to solve these challenges, and (3) study the effect of including semantics in handling manipulation attacks, and the temporal effect of data, where the authors might have changing opinions over time. The first part of the thesis focuses on user anonymity in textual data, with the aim to anonymize personal information from online user data for safe data analysis without compromising users’ privacy. We present an initial novel semantic-based approach, which can be customized to balance between preserving data quality and maximizing user anonymity depending on the application at hand. In the second part, we study author verification in micro-messages on social media. We confirm the lack of research in author verification on micro-messages, and we show that the state-of-the-art, which primarily handles long and medium-sized texts, does not perform well when applied on micro-messages. Then we present a semantics-based novel approach which uses word embeddings and sentiment analysis to collect the author’s opinion history to determine the correctness of the claim of authorship, and show its competitive performance on micro-messages. We use these results in the third part of the thesis to further improve upon our approach. We construct a dataset consisting of the tweets of the 88 most followed twitter influencers. We use it to show that the state-of-the-art is not able to handle impersonation attacks, where the content of a tweet is altered, changing the message behind the tweet, while the writing pattern is preserved. On the other hand, since our approach is aware of the text’s semantics, it is able to detect text manipulations with an accuracy above 90%. And in the fourth part of the thesis, we analyze the temporal effect of data on our approach for author verification. We study the change of authors’ opinions over time, and how to accommodate for that in our approach. We study trends of sentiments of an author per a specific topic over a period of time, and predict false authorship claims depending on what timeframe does the claim of authorship fall in
APA, Harvard, Vancouver, ISO, and other styles
2

VASILIU, GRADINARIU MARIA. "Modelisation, verification et raffinement des algorithmes auto-stabilisants." Paris 11, 2000. http://www.theses.fr/2000PA112361.

Full text
Abstract:
L'apparition des defaillances dans un systeme reparti a motive la recherche de modalites automatiques afin de concevoir des algorithmes capables de les surmonter. L'auto-stabilisation tolere les defaillances transitoares en considerant que tous les processeurs reagissent d'une maniere correcte mais l'ensemble du systeme (la configuration) peut etre corrompu. Notre memoire developpe les trois axes de recherche concernant les algorithmes auto-stabilisants, plus particulierement : la conception, la verification et le raffinement. Afin de pouvoir verifier les proprietes d'un systeme reparti auto-stabilisants nous avons construit le modele, plus precisement le cadre de preuve, utilise tout au long de notre memoire. Apres avoir definie d'une maniere coherente et unitaire l'auto-stabilisation probabiliste nous avons continuer notre memoire en etudiant les diverses techniques de verification d'algorithmes auto-stabilisants. De plus, nous avons propose une nouvelle methode de composition d'algorithmes, qui par rapport aux methodes classiques renforce les algorithmes auto-stabilisants face au comportement asynchrone du systeme. Dans une composition croisee le choix du module fort (de la plateforme de transformation) est la tache la plus difficile a cause des proprietes speciales qu'un tel module doit verifier. Nous avons montre par la suite qu'il existe des algorithmes qui peuvent etre utilises en tant que plateforme de transformations dans une composition croisee. Ainsi, nous avons presente dans le quatrieme chapitre un algorithme qui est de plus solution pour le probleme de l'exclusion mutuelle locale. La derniere partie de notre memoire est une application pour les resultats theoriques obtenues auparavant. Afin de montrer que les methodes de verification et transformation presentees auparavant sont applicables aux algorithmes reels, dans le dernier chapitre nous avons etudie les plus importants problemes de l'algorithmique repartie, plus precisement ceux relies a l'allocation de ressources : l'exclusion mutuelle et sa generalisation la l-exclusion mutuelle ainsi que le probleme d'election de leader.
APA, Harvard, Vancouver, ISO, and other styles
3

Kebaili, Mejid. "Réflexions autour de la méthodologie de vérification des circuits multi-horloges : analyse qualitative et automatisation." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAT064/document.

Full text
Abstract:
Depuis plusieurs années, le marché des circuits intégrés numériques requiert des systèmes de plus en plus complexes dans un temps toujours plus réduit. Afin de répondre à ses deux exigences, les industriels de la conception font appel à des fournisseurs externes proposant des circuits fonctionnant sur des signaux d'horloge dédiés. Lorsque ces derniers communiquent entre eux, les horloges d'émission et de réception ne sont pas les mêmes, on parle de « Clock Domain Crossing » (CDC).Les CDC correspondent à des communications asynchrones et peuvent provoquer des dysfonctionnements critiques. Par ailleurs, ces problèmes étant intermittents et complexes à analyser, ils ne peuvent pas être exhaustivement vérifiés avec des méthodes telles que l’analyse de timing ou la simulation fonctionnelle. Avec l'augmentation du nombre de CDC dans les circuits, les industriels de la conception assistée par ordinateur (EDA) ont proposé des solutions logicielles spécialisées dans la vérification statique des CDC. Cependant, les circuits développés étant en constante évolution, les outils ne sont pas en mesure de s’adapter. Pour pallier ces problèmes, la vérification industrielle des CDC est basée sur la spécification de contraintes et d'exclusions par l'utilisateur. Ces actions, qui se substituent aux outils, peuvent masquer des bugs. De plus, l’effort humain requis par cette approche n’est pas compatible avec le temps alloué au développement de circuits industriels. Nous avons donc cherché à automatiser la vérification en proposant des solutions basées sur des propriétés formelles. Les travaux ont consisté à analyser les différentes techniques de conception et de vérification des CDC à travers l’évaluation des principaux outils du marché. A partir des résultats obtenus, nous avons formalisé les problèmes pratiques et proposé des modèles permettant d’obtenir des résultats exhaustifs automatiquement. Les essais ont été réalisés sur un sous-système à base de processeurs (CPUSS) développé chez STMicroelectronics. L'adoption de nos modèles permet une vérification complète des CPUSS de manière automatique ce qui est essentiel dans un environnement industriel compétitif. En effet, le nombre d’informations devant être spécifiées par l’utilisateur a été réduit de moitié pour chacun des outils évalués. Par ailleurs, ces travaux ont montré que l’axe de développement des outils CDC avec l’ajout de fonctionnalités telles que les flots hiérarchiques ou l’injection de fautes n’améliore pas la qualité de résultats. Une collaboration ayant été mise en place avec les principaux fournisseurs outils, certaines solutions seront probablement intégrées aux outils dans les années à venir
For several years now, the digital IC market has been requiring both more complex systems and reduced production times. In this context, the semiconductor chip maker companies call on external IP providers offering components working on dedicated clock signals. When these IPs communicate between them, the source and destination clocks are not the same, we talk about "Clock Domain Crossing" (CDC).CDC correspond to asynchronous communications and can cause critical failures. Furthermore, due to the complexity and the random nature of CDC issues, they can not be exhaustively checked with methods such as timing analysis or functional simulation. With the increase of CDC in the digital designs, EDA tools providers have developed software solutions dedicated to CDC static verification.Whereas, the designs are subject to continuous change, the verification tools are not able to be up to date. To resolve these practical issues, the CDC industrial verification is based on the specification of constraints and exclusions by the user. This manual flow, which replaces the tools, can mask bugs. Moreover, the human effort required by this approach is incompatible with the time allowed to industrial designs development.Our goal has been to automate the verification submitting solutions based on formal properties.The work consisted in the analysis of the different CDC design and verification approaches through the evaluation of main CDC checker tools. From the results obtained, we have formalized the practical problems and proposed models to obtain automatically exhaustive results. The tests have been performed on a processor-based subsystem (CPUSS) developed at STMicroelectronics.Adopting our models enables a complete checking of CPUSS in an automatic way, which is essential within a competitive industrial environment. Actually, the amount of information to be specified by the user has been reduced by half for each one of the evaluated tools. Otherwise, this work has shown that the development axis of the CDC tools despite the addition of functionalities such as hierarchical flows or fault injection, doesn’t improve the quality of results (QoR). Since a collaboration has been established with the main tool providers some solutions would probably be included into the tools over the coming years
APA, Harvard, Vancouver, ISO, and other styles
4

Ahmad, Manzoor. "Modeling and verification of functional and non functional requirements of ambient, self adaptative systems." Phd thesis, Université Toulouse le Mirail - Toulouse II, 2013. http://tel.archives-ouvertes.fr/tel-00965934.

Full text
Abstract:
The overall contribution of this thesis is to propose an integrated approach for modeling and verifying the requirements of Self Adaptive Systems using Model Driven Engineering techniques. Model Driven Engineering is primarily concerned with reducing the gap between problem and software implementation domains through the use of technologies that support systematic transformation of problem level abstractions to software implementations. By using these techniques, we have bridged this gap through the use of models that describe complex systems at multiple levels of abstraction and through automated support for transforming and analyzing these models. We take requirements as input and divide it into Functional and Non Functional Requirements. We then use a process to identify those requirements that are adaptable and those that cannot be changed. We then introduce the concepts of Goal Oriented Requirements Engineering for modeling the requirements of Self Adaptive Systems, where Non Functional Requirements are expressed in the form of goals which is much more rich and complete in defining relations between requirements. We have identified some problems in the conventional methods of requirements modeling and properties verification using existing techniques, which do not take into account the adaptability features associated with Self Adaptive Systems. Our proposed approach takes into account these adaptable requirements and we provide various tools and processes that we developed for the requirements modeling and verification of Self Adaptive Systems. We validate our proposed approach by applying it on two different case studies in the domain of Self Adaptive Systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Graja, Zaineb. "Vérification formelle des systèmes multi-agents auto-adaptatifs." Thesis, Toulouse 3, 2015. http://www.theses.fr/2015TOU30105/document.

Full text
Abstract:
Un des défis majeurs pour le développement des Systèmes Multi-Agents (SMA) auto-organisateurs est de garantir la convergence du système vers la fonction globale attendue par un observateur externe et de garantir que les agents sont capables de s'adapter face aux perturbations. Dans la littérature, plusieurs travaux se sont basés sur la simulation et le model-checking pour analyser les SMA auto-organisateurs. La simulation permet aux concepteurs d'expérimenter plusieurs paramètres et de créer certaines heuristiques pour faciliter la conception du système. Le model-checking fournit un support pour découvrir les blocages et les violations de propriétés. Cependant, pour faire face à la complexité de la conception des SMA auto-organisateurs, le concepteur a également besoin de techniques qui prennent en charge non seulement la vérification, mais aussi le processus de développement lui-même. En outre, ces techniques doivent permettre un développement méthodique et faciliter le raisonnement sur divers aspects du comportement du système à différents niveaux d'abstraction. Dans cette thèse, trois contributions essentielles ont été apportées dans le cadre du développement et la vérification formelle des SMA auto-organisateurs: une formalisation à l'aide du langage B-événementiel des concepts clés de ces systèmes en trois niveaux d'abstraction (micro, méso et macro), une expérimentation d'une stratégie de raffinement descendante pour le développement des SMA auto-organisateurs et la proposition d'un processus de raffinement ascendant basé sur des patrons de raffinement
A major challenge for the development of self-organizing MAS is to guarantee the convergence of the system to the overall function expected by an external observer and to ensure that agents are able to adapt to changes. In the literature, several works were based on simulation and model-checking to study self-organizing MAS. The simulation allows designers to experiment various settings and create some heuristics to facilitate the system design. Model checking provides support to discover deadlocks and properties violations. However, to cope with the complexity of self-organizing MAS, the designer also needs techniques that support not only verification, but also the development process itself. Moreover, such techniques should support disciplined development and facilitate reasoning about various aspects of the system behavior at different levels of abstraction. In this thesis, three essential contributions were made in the field of formal development and verification of self-organizing MAS: a formalization with the Event-B language of self-organizing MAS key concepts into three levels of abstraction, an experimentation of a top-down refinement strategy for the development of self-organizing MAS and the definition of a bottom-up refinement process based on refinement patterns
APA, Harvard, Vancouver, ISO, and other styles
6

Stuner, Bruno. "Cohorte de réseaux de neurones récurrents pour la reconnaissance de l'écriture." Thesis, Normandie, 2018. http://www.theses.fr/2018NORMR024.

Full text
Abstract:
Les méthodes à l’état de l’art de la reconnaissance de l’écriture sont fondées sur des réseaux de neurones récurrents (RNN) à cellules LSTM ayant des performances remarquables. Dans cette thèse, nous proposons deux nouveaux principes la vérification lexicale et la génération de cohorte afin d’attaquer les problèmes de la reconnaissance de l’écriture : i) le problème des grands lexiques et des décodages dirigés par le lexique ii) la problématique de combinaison de modèles optiques pour une meilleure reconnaissance iii) la nécessité de constituer de très grands ensembles de données étiquetées dans un contexte d’apprentissage profond. La vérification lexicale est une alternative aux décodages dirigés par le lexique peu étudiée à cause des faibles performances des modèles optiques historiques (HMM). Nous montrons dans cette thèse qu’elle constitue une alternative intéressante aux approches dirigées par le lexique lorsqu’elles s’appuient sur des modèles optiques très performants comme les RNN LSTM. La génération de cohorte permet de générer facilement et rapidement un grand nombre de réseaux récurrents complémentaires en un seul apprentissage. De ces deux techniques nous construisons et proposons un nouveau schéma de cascade pour la reconnaissance de mots isolés, une nouvelle combinaison au niveau ligne LV-ROVER et une nouvelle stratégie d’auto-apprentissage de RNN LSTM pour la reconnaissance de mots isolés. La cascade proposée permet de combiner avec la vérification lexicale des milliers de réseaux et atteint des résultats à l’état de l’art pour les bases Rimes et IAM. LV-ROVER a une complexité réduite par rapport à l’algorithme original ROVER et permet de combiner des centaines de réseaux sans modèle de langage tout en dépassant l’état de l’art pour la reconnaissance de lignes sur le jeu de donnéesRimes. Notre stratégie d’auto-apprentissage permet d’apprendre à partir d’un seul réseau BLSTM et sans paramètres grâce à la cohorte et la vérification lexicale, elle montre d’excellents résultats sur les bases Rimes et IAM
State-of-the-art methods for handwriting recognition are based on LSTM recurrent neural networks (RNN) which achieve high performance recognition. In this thesis, we propose the lexicon verification and the cohort generation as two new building blocs to tackle the problem of handwriting recognition which are : i) the large vocabulary problem and the use of lexicon driven methods ii) the combination of multiple optical models iii) the need for large labeled dataset for training RNN. The lexicon verification is an alternative to the lexicon driven decoding process and can deal with lexicons of 3 millions words. The cohort generation is a method to get easily and quickly a large number of complementary recurrent neural networks extracted from a single training. From these two new techniques we build and propose a new cascade scheme for isolated word recognition, a new line level combination LV-ROVER and a new self-training strategy to train LSTM RNN for isolated handwritten words recognition. The proposed cascade combines thousands of LSTM RNN with lexicon verification and achieves state-of-the art word recognition performance on the Rimes and IAM datasets. The Lexicon Verified ROVER : LV-ROVER, has a reduce complexity compare to the original ROVER algorithm and combine hundreds of recognizers without language models while achieving state of the art for handwritten line text on the RIMES dataset. Our self-training strategy use both labeled and unlabeled data with the unlabeled data being self-labeled by its own lexicon verified predictions. The strategy enables self-training with a single BLSTM and show excellent results on the Rimes and Iam datasets
APA, Harvard, Vancouver, ISO, and other styles
7

Khebbeb, Khaled. "Formalisation et évaluation de stratégies d’élasticité multi-couches dans le Cloud." Thesis, Pau, 2019. http://www.theses.fr/2019PAUU3010.

Full text
Abstract:
L'élasticité est une propriété qui permet aux systèmes Cloud de s'auto-adapter à leur charge de travail en provisionnant et en libérant des ressources informatiques, de manière autonomique, lorsque la demande augmente et diminue. En raison de la nature imprévisible de la charge de travail et des nombreux facteurs déterminant l'élasticité, fournir des plans d'action précis pour gérer l'élasticité d'un système cloud, tout en respectant des politiques de haut niveau (performances, cout, etc.) est une tâche particulièrement difficile.Les travaux de cette thèse visent à proposer, en utilisant le formalisme des bigraphes comme modèle formel, une spécification et une implémentation des systèmes Cloud Computing élastiques sur deux aspects : structurel et comportemental.Du point de vue structurel, le but est de définir et de modéliser une structure correcte des systèmes Cloud du côté " backend ". Cette partie est supportée par les capacités de spécification fournies par le formalisme des Bigraphes, à savoir : le principe de "sorting" et de règles de construction permettant de définir les desiderata du concepteur. Concernant l'aspect comportemental, il s'agit de modéliser, valider et implémenter des stratégies génériques de mise à l'échelle automatique en vue de décrire les différents mécanismes d'auto-adaptation élastiques des systèmes cloud (mise à l'échelle horizontale, verticale, migration, etc.), en multi-couches (i.e., aux niveaux service et infrastructure). Ces tâches sont prises en charge par les aspects dynamiques propres aux Systèmes Réactifs Bigraphiques (BRS) notamment par le biais des règles de réaction.Les stratégies d'élasticité introduites visent à guider le déclenchement conditionnel des différentes règles de réaction définies, afin de décrire les comportements d'auto-adaptation des systèmes Cloud au niveau service et infrastructure. L'encodage de ces spécifications et leurs implémentations sont définis en logique de réécriture via le langage Maude. Leur bon fonctionnement est vérifié formellement à travers une technique de model-checking supportée par la logique temporelle linéaire LTL.Afin de valider ces contributions d'un point de vue quantitatif, nous proposons une approche à base de file d'attente pour analyser, évaluer et discuter les stratégies d'élasticité d'un système Cloud à travers différents scénarios simulés. Dans nos travaux, nous explorons la définition d'une "bonne" stratégie en prenant en compte une étude de cas qui repose sur la nature changeante de la charge de travail. Nous proposons une manière originale de composer plusieurs stratégies d'élasticité à plusieurs niveaux afin de garantir différentes politiques de haut-niveau
Elasticity property allows Cloud systems to adapt to their incoming workload by provisioning and de-provisioning computing resources in an autonomic manner, as the demand rises and drops. Due to the unpredictable nature of the workload and the numerous factors that impact elasticity, providing accurate action plans to insure a Cloud system's elasticity while preserving high level policies (performance, costs, etc.) is a particularly challenging task. This thesis aims at providing a thorough specification and implementation of Cloud systems, by relying on bigraphs as a formal model, over two aspects: structural and behavioral.Structurally, the goal is to define a correct modeling of Cloud systems' "back-end" structure. This part is supported by the specification capabilities of Bigraph formalism. Specifically, via "sorting" mechanisms and construction rules that allow defining the designer's desiderata. As for the behavioral part, it consists of model, implement and validate generic elasticity strategies in order to describe Cloud systems' auto-adaptive behaviors (i.e., horizontal and vertical scaling, migration, etc.) in a cross-layer manner (i.e., at service and infrastructure levels). These tasks are supported by the dynamic aspects of Bigraphical Reactive Systems (BRS) formalism (through reaction rules).The introduced elasticity strategies aim at guiding the conditional triggering of the defined reaction rules, to describe Cloud systems' auto-scaling behaviors in a cross-layered manner. The encoding of these specifications and their implementation are defined in Rewrite Logic via Maude language. Their correctness is formally verified through a model-checking technique supported by the linear temporal logic LTL.In order to quantitatively validate these contributions, we propose a queuing-based approach in order to evaluate, analyze and discuss elasticity strategies in Cloud systems through different simulated execution scenarios. In this work, we explore the definition of a “good” strategy through a case study which considers the changing nature of the input workload. We propose an original way de compose different cross-layer elasticity strategies to guarantee different high-level policies
APA, Harvard, Vancouver, ISO, and other styles
8

Guillaumin, Matthieu. "Données multimodales pour l'analyse d'image." Phd thesis, Grenoble, 2010. http://tel.archives-ouvertes.fr/tel-00522278/en/.

Full text
Abstract:
La présente thèse s'intéresse à l'utilisation de méta-données textuelles pour l'analyse d'image. Nous cherchons à utiliser ces informations additionelles comme supervision faible pour l'apprentissage de modèles de reconnaissance visuelle. Nous avons observé un récent et grandissant intérêt pour les méthodes capables d'exploiter ce type de données car celles-ci peuvent potentiellement supprimer le besoin d'annotations manuelles, qui sont coûteuses en temps et en ressources. Nous concentrons nos efforts sur deux types de données visuelles associées à des informations textuelles. Tout d'abord, nous utilisons des images de dépêches qui sont accompagnées de légendes descriptives pour s'attaquer à plusieurs problèmes liés à la reconnaissance de visages. Parmi ces problèmes, la vérification de visages est la tâche consistant à décider si deux images représentent la même personne, et le nommage de visages cherche à associer les visages d'une base de données à leur noms corrects. Ensuite, nous explorons des modèles pour prédire automatiquement les labels pertinents pour des images, un problème connu sous le nom d'annotation automatique d'image. Ces modèles peuvent aussi être utilisés pour effectuer des recherches d'images à partir de mots-clés. Nous étudions enfin un scénario d'apprentissage multimodal semi-supervisé pour la catégorisation d'image. Dans ce cadre de travail, les labels sont supposés présents pour les données d'apprentissage, qu'elles soient manuellement annotées ou non, et absentes des données de test. Nos travaux se basent sur l'observation que la plupart de ces problèmes peuvent être résolus si des mesures de similarité parfaitement adaptées sont utilisées. Nous proposons donc de nouvelles approches qui combinent apprentissage de distance, modèles par plus proches voisins et méthodes par graphes pour apprendre, à partir de données visuelles et textuelles, des similarités visuelles spécifiques à chaque problème. Dans le cas des visages, nos similarités se concentrent sur l'identité des individus tandis que, pour les images, elles concernent des concepts sémantiques plus généraux. Expérimentalement, nos approches obtiennent des performances à l'état de l'art sur plusieurs bases de données complexes. Pour les deux types de données considérés, nous montrons clairement que l'apprentissage bénéficie de l'information textuelle supplémentaire résultant en l'amélioration de la performance des systèmes de reconnaissance visuelle.
APA, Harvard, Vancouver, ISO, and other styles
9

Guillaumin, Matthieu. "Données multimodales pour l'analyse d'image." Phd thesis, Grenoble, 2010. http://www.theses.fr/2010GRENM048.

Full text
Abstract:
La présente thèse s'intéresse à l'utilisation de méta-données textuelles pour l'analyse d'image. Nous cherchons à utiliser ces informations additionelles comme supervision faible pour l'apprentissage de modèles de reconnaissance visuelle. Nous avons observé un récent et grandissant intérêt pour les méthodes capables d'exploiter ce type de données car celles-ci peuvent potentiellement supprimer le besoin d'annotations manuelles, qui sont coûteuses en temps et en ressources. Nous concentrons nos efforts sur deux types de données visuelles associées à des informations textuelles. Tout d'abord, nous utilisons des images de dépêches qui sont accompagnées de légendes descriptives pour s'attaquer à plusieurs problèmes liés à la reconnaissance de visages. Parmi ces problèmes, la vérification de visages est la tâche consistant à décider si deux images représentent la même personne, et le nommage de visages cherche à associer les visages d'une base de données à leur noms corrects. Ensuite, nous explorons des modèles pour prédire automatiquement les labels pertinents pour des images, un problème connu sous le nom d'annotation automatique d'image. Ces modèles peuvent aussi être utilisés pour effectuer des recherches d'images à partir de mots-clés. Nous étudions enfin un scénario d'apprentissage multimodal semi-supervisé pour la catégorisation d'image. Dans ce cadre de travail, les labels sont supposés présents pour les données d'apprentissage, qu'elles soient manuellement annotées ou non, et absentes des données de test. Nos travaux se basent sur l'observation que la plupart de ces problèmes peuvent être résolus si des mesures de similarité parfaitement adaptées sont utilisées. Nous proposons donc de nouvelles approches qui combinent apprentissage de distance, modèles par plus proches voisins et méthodes par graphes pour apprendre, à partir de données visuelles et textuelles, des similarités visuelles spécifiques à chaque problème. Dans le cas des visages, nos similarités se concentrent sur l'identité des individus tandis que, pour les images, elles concernent des concepts sémantiques plus généraux. Expérimentalement, nos approches obtiennent des performances à l'état de l'art sur plusieurs bases de données complexes. Pour les deux types de données considérés, nous montrons clairement que l'apprentissage bénéficie de l'information textuelle supplémentaire résultant en l'amélioration de la performance des systèmes de reconnaissance visuelle
This dissertation delves into the use of textual metadata for image understanding. We seek to exploit this additional textual information as weak supervision to improve the learning of recognition models. There is a recent and growing interest for methods that exploit such data because they can potentially alleviate the need for manual annotation, which is a costly and time-consuming process. We focus on two types of visual data with associated textual information. First, we exploit news images that come with descriptive captions to address several face related tasks, including face verification, which is the task of deciding whether two images depict the same individual, and face naming, the problem of associating faces in a data set to their correct names. Second, we consider data consisting of images with user tags. We explore models for automatically predicting tags for new images, i. E. Image auto-annotation, which can also used for keyword-based image search. We also study a multimodal semi-supervised learning scenario for image categorisation. In this setting, the tags are assumed to be present in both labelled and unlabelled training data, while they are absent from the test data. Our work builds on the observation that most of these tasks can be solved if perfectly adequate similarity measures are used. We therefore introduce novel approaches that involve metric learning, nearest neighbour models and graph-based methods to learn, from the visual and textual data, task-specific similarities. For faces, our similarities focus on the identities of the individuals while, for images, they address more general semantic visual concepts. Experimentally, our approaches achieve state-of-the-art results on several standard and challenging data sets. On both types of data, we clearly show that learning using additional textual information improves the performance of visual recognition systems
APA, Harvard, Vancouver, ISO, and other styles
10

Shiau, Wen-Ming, and 蕭文明. "Link Quality Control System and Laboratory Auto-verification System as ASTM Protocol." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/znjxfj.

Full text
Abstract:
碩士
國立中正大學
資訊管理學系暨研究所
103
The accuracy of clinical diagnoses is important at all levels of hospitals. Laboratory test reports offer one of the foundations upon which physicians make medical decisions.   The workflow of clinical laboratories can be divided by tasks into three stages, namely pre-examination, examination, and post-examination. The tasks in the pre-examination stage are collection, preservation, processing, and delivery of samples. The main task in the examination stage is to analyze the test while maintaining the analysis quality. The tasks in the post-examination stage are to validate the accuracy of the analysis results and to transmit data to laboratory information systems (LIS). Each process and step in these stages has a decisive effect on the analysis results. The analysis results can help physicians provide the most effective treatments only when each step of the test has been carried out with no error. In 1990s, there has been a rapid growth of laboratory automation facilities, especially in the US, European nations, and Japan. With the increasing prevalence of these automation facilities, the work efficiency at clinical laboratories has also improved. The maintenance and quality control of automation facilities has also become a new issue for clinical laboratories. Without regular and proper maintenance, the accuracy of the analysis results generated by these facilities will be affected. Therefore, quality control in clinical laboratories has been a common goal of all laboratories in recent years. Through quality control, they can maintain the accuracy of analysis results and further speed up the release of reports, improve the healthcare quality, and promote doctor-patient relationships.   Laboratory auto-verification system is a system that all clinical laboratories seek to build. By integrating the existing real-time quality management system and using ASTM protocol, the two systems can be connected via RS-232. In addition to providing real-time diagnosis of transmission quality, the system can achieve automatic verification of test reports, improve the report release efficiency, and shorten the required time of laboratory tests at a minimum cost.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Author verification"

1

Panokin, Aleksandr. Verification of court decisions in criminal cases: history and modernity. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1836962.

Full text
Abstract:
The paper analyzes the historical retrospective and a comparative study of the verification of court decisions in criminal cases. The author traces the emergence of the idea of checking court decisions and the first experiments of its implementation, the transition from the "court with a judge" to the "audit" procedure for monitoring court decisions, and then to the consideration of complaints against court decisions as a continuation of the dispute between the parties and the formation of methods and procedures for reviewing criminal cases, depending on the subject of appeal. The features of the Romano-German and English models of judicial review are highlighted. Special attention is paid to the Soviet system of verification of sentences, rulings and definitions as the basis of the socialist model of judicial review and its subsequent transformation in Russia in the post-Soviet period. The monograph is intended for researchers, teachers, undergraduate, specialist, master's, postgraduate and doctoral students, as well as practicing lawyers.
APA, Harvard, Vancouver, ISO, and other styles
2

Tuzov, Andrey, and Nikolay Stoyko. Verification proceedings in the criminal proceedings of the Czech Republic. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2056731.

Full text
Abstract:
The monograph examines the verification proceedings in the criminal proceedings of the Czech Republic. In addition to describing the theoretical model of verification proceedings, the authors thoroughly describe the proceedings on complaints, appeals, cassations, complaints of violation of the law, petitions for the resumption of proceedings, i.e. all types of proceedings in which the legality, validity and motivation of decisions are checked. In describing the proceedings, the authors are based on the text of the Criminal Procedure Law of the Czech Republic (Zákon ze dne 29. listopadu 1961 o trestním çízení soudním (trestní řád)) as of 06/01/2022, the judicial practice of the Supreme Court of the Czech Republic and the Constitutional Court of the Czech Republic, judicial statistics data for 2015-2021. It is intended for law school teachers, researchers, students and postgraduates studying criminal procedure law and foreign law.
APA, Harvard, Vancouver, ISO, and other styles
3

Apasova, Ekaterina, Nikita Kochetkov, Irina Kulagina, Mariya Nikitskaya, Alla Pogodina, Marina Rashodchikova, Nataliya Tolstyh, Irina Uglanova, and Valeriy Fedorov. Educational motivation: development of methodological tools. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2055741.

Full text
Abstract:
The monograph analyzes the history and current state of domestic and foreign psychological research in the field of educational motivation. The process of creating new methods for diagnosing the educational motivation of schoolchildren of different ages, as well as the procedures and results of psychometric verification and validation of these methods, is described. The application includes four new methods of studying educational motivation, which were developed by the authors. It is addressed to students studying at psychological faculties, research psychologists, as well as teachers, school psychologists and other practitioners dealing with the education and upbringing of the younger generation.
APA, Harvard, Vancouver, ISO, and other styles
4

Urban, Susanne. Nach der Schoah: Judishe Autoren und Deutschland : Literatur zwischen Selbstvergewisserung und Selbstbestimmung = After the Schoah : Jewish authors and Germany : literature between verification and self-determination. Frankfurt/Main: Buchmesse, Frankfurt Book Fair, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Urban, Susanne. Nach der Schoah: Judishe Autoren und Deutschland : Literatur zwischen Selbstvergewisserung und Selbstbestimmung = After the Schoah : Jewish authors and Germany : literature between verification and self-determination. Frankfurt/Main: Buchmesse, Frankfurt Book Fair, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shishkina, Elena. Tactical and forensic support of investigative activities. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1246682.

Full text
Abstract:
The textbook is devoted to the study of the main means of tactical support for the activities of the investigator in the investigation of crimes. The author's position on the concept, essence and content of tactical means of investigative activity — tactical techniques, tactical operations and tactical combinations, tactical decisions and tactics of individual investigative actions is presented. The paper deals with the issues of tactical and forensic support of individual, the most common investigative actions - inspection, interrogation, verification of testimony on the spot, etc. It is intended for law students studying in the specialties 40.05.01 "Legal support of national security", 40.05.04 "Judicial and prosecutorial activities", as well as for undergraduates studying in the areas of training in the field of jurisprudence.
APA, Harvard, Vancouver, ISO, and other styles
7

Kazakova, Nataliya. Internal audit of estimated reserves and liabilities as a method for diagnosing corporate risks. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1089678.

Full text
Abstract:
The monograph is devoted to the study of methods of diagnostics and control of corporate risks associated with the formation and use of estimated reserves and liabilities in commercial organizations. The research results are aimed at creating a corporate system for identifying and controlling corporate risks using estimated reserves and estimated liabilities. The methodological recommendations offered by the authors on verification of accrued expenses allow us to identify the risks of inefficient use of expenses, including fraudulent actions. The methodological tools are supplemented with empirical materials obtained during testing of the internal audit methodology in industrial organizations, audit companies, as well as when performing research work. It will be useful for researchers, researchers, teachers, applicants for scientific degrees, and can also be used in the system of additional professional education, advanced training, for self-development of management personnel of financial and economic services in business and government structures.
APA, Harvard, Vancouver, ISO, and other styles
8

Andrichenko, Lyudmila, Elena Gorenskaya, Aleksandr Emel'yanov, Aleksey Efremov, Sergey Zyryanov, Pavel Kabytov, Nikolay Kazancev, et al. Permissive activity in the mechanism of public administration. ru: INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/1963277.

Full text
Abstract:
In the monograph, based on the modern legal doctrine and regulatory legal framework, it is planned to identify the essence, functions and legal nature of permits, systematize them, determine the goals of licensing activities and organizational and legal forms of its implementation, principles of legal regulation of the licensing system, conduct a comprehensive analysis of public relations in this area and the legislation regulating them, as well as formulate scientifically based proposals for improving the relevant institute of administrative law. The authors in the context of licensing activities will investigate the legal nature of the license, registration, special permit, admission, special pass, issue, approval, certificate, verification, examination, certification, accreditation, certification, quotas, special law, certification, etc. This study will be both theoretical and applied (in terms of implementation licensing activities in certain branches of public administration). It is supposed to use historical-legal and comparative-legal (comparative) methods. The publication is intended for civil servants, students, postgraduates, researchers, as well as those who are interested in issues of licensing activities in Russia.
APA, Harvard, Vancouver, ISO, and other styles
9

Pathrose, Plato. ADAS and Automated Driving: A Practical Approach to Verification and Validation. SAE International, 2022. http://dx.doi.org/10.4271/9781468604146.

Full text
Abstract:
The day will soon come when you will be able to verbally communicate with a vehicle and instruct it to drive to a location. The car will navigate through street traffic and take you to your destination without additional instruction or effort on your part. Today, this scenario is still in the future, but the automotive industry is racing to toward the finish line to have automated driving vehicles deployed on our roads. ADAS and Automated Driving: A Practical Approach to Verification and Validation focuses on how automated driving systems (ADS) can be developed from concept to a product on the market for widescale public use. It covers practically viable approaches, methods, and techniques with examples from multiple production programs across different organizations. The author provides an overview of the various Advanced Driver Assistance Systems (ADAS) and ADS currently being developed and installed in vehicles. The technology needed for large-scale production and public use of fully autonomous vehicles is still under development, and the creation of such technology is a highly innovative area of the automotive industry. This text is a comprehensive reference for anyone interested in a career focused on the verification and validation of ADAS and ADS. The examples included in the volume provide the reader foundational knowledge and follow best and proven practices from the industry. Using the information in ADAS and Automated Driving, you can kick start your career in the field of ADAS and ADS.
APA, Harvard, Vancouver, ISO, and other styles
10

Ichino, Anna, and Greg Currie. Truth and Trust in Fiction. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198805403.003.0004.

Full text
Abstract:
This chapter examines two pathways through which fictions may affect beliefs: by invading readers’ cognitive system via heuristics and other sub-rational devices, and by expressing authorial beliefs that readers take to be reliable. Focusing mostly on the latter pathway, the chapter distinguishes fiction as a mechanism for the transmission of uncontroversial factual information from fiction as a means of expressing distinctive perspectives on evaluative propositions. In both cases, the inferences on which readers rely are precarious, and especially so with evaluative cases where there is little hope of independent verification. Moreover, trust, which in other contexts can increase the reliability of beliefs transmitted from person to person, cannot be much depended on when it comes to belief transmission from author to reader.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Author verification"

1

Potha, Nektaria, and Efstathios Stamatatos. "Dynamic Ensemble Selection for Author Verification." In Lecture Notes in Computer Science, 102–15. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15712-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Reinhard, Tobias, and Bart Jacobs. "Ghost Signals: Verifying Termination of Busy Waiting." In Computer Aided Verification, 27–50. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81688-9_2.

Full text
Abstract:
AbstractPrograms for multiprocessor machines commonly perform busy waiting for synchronization. We propose the first separation logic for modularly verifying termination of such programs under fair scheduling. Our logic requires the proof author to associate a ghost signal with each busy-waiting loop and allows such loops to iterate while their corresponding signal $$s$$ s is not set. The proof author further has to define a well-founded order on signals and to prove that if the looping thread holds an obligation to set a signal $$s'$$ s ′ , then $$s'$$ s ′ is ordered above $$s$$ s . By using conventional shared state invariants to associate the state of ghost signals with the state of data structures, programs busy-waiting for arbitrary conditions over arbitrary data structures can be verified.
APA, Harvard, Vancouver, ISO, and other styles
3

Bhanu Prasad, A., S. Rajeswari, A. Venkannababu, and T. Raghunadha Reddy. "Author Verification Using Rich Set of Linguistic Features." In Advances in Intelligent Systems and Computing, 197–203. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7563-6_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oishi, Shin’ichi. "Verified Numerical Computations and Related Applications." In International Symposium on Mathematics, Quantum Theory, and Cryptography, 11–12. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stubbemann, Maximilian, and Gerd Stumme. "LG4AV: Combining Language Models and Graph Neural Networks for Author Verification." In Lecture Notes in Computer Science, 315–26. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-01333-1_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bevendorff, Janek, Mara Chinea-Ríos, Marc Franco-Salvador, Annina Heini, Erik Körner, Krzysztof Kredens, Maximilian Mayerl, et al. "Overview of PAN 2023: Authorship Verification, Multi-author Writing Style Analysis, Profiling Cryptocurrency Influencers, and Trigger Detection." In Lecture Notes in Computer Science, 518–26. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-28241-6_60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bevendorff, Janek, Ian Borrego-Obrador, Mara Chinea-Ríos, Marc Franco-Salvador, Maik Fröbe, Annina Heini, Krzysztof Kredens, et al. "Overview of PAN 2023: Authorship Verification, Multi-Author Writing Style Analysis, Profiling Cryptocurrency Influencers, and Trigger Detection." In Lecture Notes in Computer Science, 459–81. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-42448-9_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bevendorff, Janek, Xavier Bonet Casals, Berta Chulvi, Daryna Dementieva, Ashaf Elnagar, Dayne Freitag, Maik Fröbe, et al. "Overview of PAN 2024: Multi-author Writing Style Analysis, Multilingual Text Detoxification, Oppositional Thinking Analysis, and Generative AI Authorship Verification." In Lecture Notes in Computer Science, 3–10. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-56072-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Yu-Fang, Kai-Min Chung, Ondřej Lengál, Jyun-Ao Lin, and Wei-Lun Tsai. "AutoQ: An Automata-Based Quantum Circuit Verifier." In Computer Aided Verification, 139–53. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-37709-9_7.

Full text
Abstract:
AbstractWe present a specification language and a fully automated tool named AutoQ for verifying quantum circuits symbolically. The tool implements the automata-based algorithm from [14] and extends it with the capabilities for symbolic reasoning. The extension allows to specify relational properties, i.e., relationships between states before and after executing a circuit. We present a number of use cases where we used AutoQ to fully automatically verify crucial properties of several quantum circuits, which have, to the best of our knowledge, so far been proved only with human help.
APA, Harvard, Vancouver, ISO, and other styles
10

Nagasamudram, Ramana, Anindya Banerjee, and David A. Naumann. "The WhyRel Prototype for Modular Relational Verification of Pointer Programs." In Tools and Algorithms for the Construction and Analysis of Systems, 133–51. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30820-8_11.

Full text
Abstract:
Abstract Verifying relations between programs arises as a task in various verification contexts such as optimizing transformations, relating new versions of programs with older versions (regression verification), and noninterference. However, relational verification for programs acting on dynamically allocated mutable state is not well supported by existing tools, which provide a high level of automation at the cost of restricting the programs considered. Auto-active tools, on the other hand, require more user interaction but enable verification of a broader class of programs. This article presents WhyRel, a tool for the auto-active verification of relational properties of pointer programs based on relational region logic. WhyRel is evaluated through verification case studies, relying on SMT solvers orchestrated by the Why3 platform on which it builds. Case studies include establishing representation independence of ADTs, showing noninterference, and challenge problems from recent literature.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Author verification"

1

van Dam, Michiel, and Claudia Hauff. "Large-scale author verification." In SIGIR '14: The 37th International ACM SIGIR Conference on Research and Development in Information Retrieval. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2600428.2609504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Author Index." In 2008 Ninth International Workshop on Microprocessor Test and Verification. IEEE, 2008. http://dx.doi.org/10.1109/mtv.2008.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Author index." In 2014 15th International Microprocessor Test and Verification Workshop (MTV). IEEE, 2014. http://dx.doi.org/10.1109/mtv.2014.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Author Index." In 2005 Sixth International Workshop on Microprocessor Test and Verification. IEEE, 2005. http://dx.doi.org/10.1109/mtv.2005.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Author Index." In 2007 Eighth International Workshop on Microprocessor Test and Verification. IEEE, 2007. http://dx.doi.org/10.1109/mtv.2007.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Author Index." In 2018 IEEE 3rd International Verification and Security Workshop (IVSW). IEEE, 2018. http://dx.doi.org/10.1109/ivsw.2018.8494898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Author Index." In 2019 IEEE 4th International Verification and Security Workshop (IVSW). IEEE, 2019. http://dx.doi.org/10.1109/ivsw.2019.8854383.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Author Index." In 2009 International Conference on Software Testing Verification and Validation. IEEE, 2009. http://dx.doi.org/10.1109/icst.2009.54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Author Index." In 2010 Workshop on Model-Driven Engineering, Verification, and Validation (MoDeVVa). IEEE, 2010. http://dx.doi.org/10.1109/modevva.2010.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"Author Index." In Seventh International Workshop on Microprocessor Test and Verification (MTV'06). IEEE, 2006. http://dx.doi.org/10.1109/mtv.2006.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Author verification"

1

Podvig, Pavel, Markus Schiller, Amy Woolf, Christine Parthemore, Almudena Azcárate Ortega, Dmitry Stefanovich, and Decker Eveleth. Exploring Options for Missile Verification. Edited by Pavel Podvig. The United Nations Institute for Disarmament Research, March 2022. http://dx.doi.org/10.37559/wmd/22/misver/01.

Full text
Abstract:
Missiles are becoming an increasingly prominent element of military arsenals, but the system of arms control that helped provide a check on the missile arms race is under considerable stress. Addressing this challenge will require developing new approaches to missile verification. This report covers various aspects of verification arrangements that could be applied to missiles. The authors look at the experience of past arms control and disarmament efforts, provide an overview of existing verification tools, and initiate a discussion of potential arrangements that could make future arms control agreements possible. The general conclusion of the report is that there is a variety of options to consider. Most verification arrangements would require a fairly high level of transparency, but that is what makes them stronger and more reliable. The path to building an effective verification arrangement is to design it in a way that facilitates cooperation and transparency.
APA, Harvard, Vancouver, ISO, and other styles
2

Tkachuk, Viktoriia, Yuliia Yechkalo, Serhiy Semerikov, Maria Kislova, and Valentyna Khotskina. Exploring Student Uses of Mobile Technologies in University Classrooms: Audience Response Systems and Development of Multimedia. [б. в.], November 2020. http://dx.doi.org/10.31812/123456789/4126.

Full text
Abstract:
The research is aimed at theoretical substantiation, development and experimental verification of methods of applying mobile technologies by university students. The research objective implies adapting audience response systems and mobile tools of multimedia development to be used in the classroom environment at universities. The research object is application of mobile ICT to the training process. The research subject is methods of applying audience response systems and mobile tools to conducting practical classes at the university. There are analyzed Ukrainian and foreign researches into the issues of mobile ICT application to the university students training. The authors have developed methods of applying audience response systems by taking Plickers as an example and mobile tools of multimedia development through using augmented reality tools. There is comparative assessment of functionality of audience response systems and mobile tools of developing multimedia with augmented reality. Efficiency of the developed technology is experimentally verified and confirmed.
APA, Harvard, Vancouver, ISO, and other styles
3

Pinchuk, O. P., and A. A. Prokopenko. Model of a computer-orient-ed methodological system for the development of digital competence of officers of the military administration of the Armed Forces of Ukraine in the system of qualification improvement. Національна академія Державної прикордонної служби України імені Б. Хмельницького, 2023. http://dx.doi.org/10.33407/lib.naes.736836.

Full text
Abstract:
Pedagogical modeling of modern educational environments remains an urgent task of educational sciences. Research on the formation and development of digital competence of specialists, although they have common features, differ and acquire characteristic features depending on the field of application. This is due to the focus on mastering specific professional skills and increasing the professional level. We found out that, compared to the social and humanitarian sphere and medicine, the development of digital competence of specialists in the military and defense industry is little discussed in scientific sources. The development of digital competence of military personnel, in particular military management officers, is an urgent problem that requires an immediate solution. On the one hand, the armed aggression of the Russian Federation adds to the criticality of the situation, on the other hand, scientific and technical progress and, as a result, the appearance of new types of weapons and the complexity of digital tools in the environments of military specialists. Scientific approaches and conceptual principles regarding the formation of digital competence of the Armed Forces of Ukraine and NATO member countries are described. Problems, contradictions and trends in the development of digital education of military specialists in the system of professional development are singled out. The article clarifies the concept of “digital competence of military command officers” of the Armed Forces of Ukraine. The authors developed and substantiated a theoretical model of a computer-oriented methodical system for the development of digital competence of officers of the military administration of the Armed Forces of Ukraine in the system of professional development, which is presented in an informative scheme with a description of individual modules combined into conceptual, target, content-methodical, procedural, technological and effective blocks. The built model ensures systematicity and consistency of the educational process in the digital educational environment of higher military education institutions for the development of digital competencies of military management officers. The technological unit contains a variety of software for training and training. In particular, specialized computer programs and multimedia guides. In the content-methodical block, among other things, the following modules are presented: cloud services; information-didactic and educational-methodical learning tools, multimedia objects, VR/AR tools, AI elements that allow selection of existing ones or creation of new learning materials; Training Course; diagnostic tools, etc. The prospect is the verification of the developed model during distance training.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography