Search results for " Verification"
showing 10 items of 91 documents
Improving Password Memorability, While Not Inconveniencing the User
2019
Abstract Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental gr…
Using privacy-transformed speech in the automatic speech recognition acoustic model training
2020
Automatic Speech Recognition (ASR) requires huge amounts of real user speech data to reach state-of-the-art performance. However, speech data conveys sensitive speaker attributes like identity that can be inferred and exploited for malicious purposes. Therefore, there is an interest in the collection of anonymized speech data that is processed by some voice conversion method. In this paper, we evaluate one of the voice conversion methods on Latvian speech data and also investigate if privacy-transformed data can be used to improve ASR acoustic models. Results show the effectiveness of voice conversion against state-of-the-art speaker verification models on Latvian speech and the effectivene…
An affordable contactless security system access for restricted area
2016
International audience; We present in this paper a security system based on identity verification process and a low-cost smart camera , intended to avoid unauthorized access to restricted area. The Le2i laboratory has a longstanding experience in smart cameras implementation and design [1], for example in the case of real-time classical face detection [2] or human fall detection [3]. The principle of the system, fully thought and designed in our laboratory, is as follows: the allowed user presents a RFID card to the reader based on Odalid system [4]. The card ID, time and date of authorized access are checked using connection to an online server. In the same time, multi-modality identity ve…
MR-guided focused ultrasound application for moving target tumor ablation in abdominal area: Coil selection
2020
PubMed: 32276552
Abitare nel reale. Dalla crisi della periferia alla tessitura di nuove relazioni contestuali
2019
I progetti redatti per “Palermo Sud-Est” sono il risultato di un Laboratorio di Laurea strutturatosi attraverso incontri, seminari, comunicazioni specialistiche, esposizioni critiche, che – in una strategia condivisa – ha visto ogni studente elaborare il proprio lavoro nel confronto con gli altri attori del Laboratorio stesso. La ricerca sui “progetti urbani” è stata impostata di modo che ogni laureando fosse messo a conoscenza dei progetti svolti nello stesso ambito territoriale dai colleghi che l’avevano preceduto, così da poter operare in continuità e contribuire a formulare un ragionamento unitario, nel quale ogni progetto costituisse continuazione, verifica o anche variante dei precede…
Epistemic and didactic values of the demonstrative process in different cultures: a case study in Geometry with Chinese and Italian students
2011
Extending SPARQL with Temporal Logic
2009
The data integration and sharing activities carried on in the framework of the Semantic Web lead to large knowledge bases that must be queried, analyzed, and exploited efficiently. Many of the knowledge representation languages of the Semantic Web, starting with RDF, are based on directed, labeled graphs, which can be also manipulated using graph algorithms and tools coming from other domains. In this paper, we propose an analysis approach of RDF graphs by reusing the verification technology developed for concurrent systems. To this purpose, we define a translation from the SPARQL query language into XTL, a general-purpose graph manipulation language implemented in the CADP verification too…
A spatial role-based authorization framework for sensor network-assisted indoor WLANs
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…
Smart Technologies for Improved Software Maintenance
2015
Steadily increasing complexity of software systems makes them difficult to configure and use without special IT knowledge. One of the solutions is to improve software systems making them “smarter”, i.e. to supplement software systems with features of self-management, at least partially. This paper describes several software components known as smart technologies, which facilitate software use and maintenance. As to date smart technologies incorporate version updating, execution environment testing, self-testing, runtime verification and business process execution. The proposed approach has been successfully applied in several software projects.
A Case Study of Open Source Software Development in Proteomic Area: The LIMS ePims
2008
The objective of this paper is to provide an illustrative feedback on development of Open Source software among several partners. We describe the first stage of the design of a specific software package, namely a customized Laboratory Information Management System (LIMS) for biology applications. This software package is structured in several modules which are reusable and can be customized for other applications. In this paper, we address the problem of multi-licensing for the same software tools due to the participation of several partners, the reuse of code source, and the subsequent distribution of this produced software.