Search results for " Verification"

showing 10 items of 91 documents

Improving Password Memorability, While Not Inconveniencing the User

2019

Abstract Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental gr…

Software_OPERATINGSYSTEMSpassword security behaviorrepetitionComputer sciencepassword memorabilityHuman Factors and ErgonomicsComputer securitycomputer.software_genreEducationPassword strengthmuistaminenPasswordta113AuthenticationRepetition (rhetorical device)turvallisuusGeneral EngineeringsalasanatHuman-Computer InteractionComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSpassword securityHardware and Architectureuser conveniencekäyttäjäkokemuscomputerpassword verificationSoftwareInternational Journal of Human-Computer Studies
researchProduct

Using privacy-transformed speech in the automatic speech recognition acoustic model training

2020

Automatic Speech Recognition (ASR) requires huge amounts of real user speech data to reach state-of-the-art performance. However, speech data conveys sensitive speaker attributes like identity that can be inferred and exploited for malicious purposes. Therefore, there is an interest in the collection of anonymized speech data that is processed by some voice conversion method. In this paper, we evaluate one of the voice conversion methods on Latvian speech data and also investigate if privacy-transformed data can be used to improve ASR acoustic models. Results show the effectiveness of voice conversion against state-of-the-art speaker verification models on Latvian speech and the effectivene…

Speaker verificationevaluationvoice conversionComputer scienceSpeech recognitionautomatic speech recognitionLatvianAcoustic model[INFO.INFO-LG] Computer Science [cs]/Machine Learning [cs.LG]privacylanguage.human_language[INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL]anonymization[INFO.INFO-LG]Computer Science [cs]/Machine Learning [cs.LG][INFO.INFO-CL] Computer Science [cs]/Computation and Language [cs.CL]Identity (object-oriented programming)languageConversion methodautomatic speaker verification
researchProduct

An affordable contactless security system access for restricted area

2016

International audience; We present in this paper a security system based on identity verification process and a low-cost smart camera , intended to avoid unauthorized access to restricted area. The Le2i laboratory has a longstanding experience in smart cameras implementation and design [1], for example in the case of real-time classical face detection [2] or human fall detection [3]. The principle of the system, fully thought and designed in our laboratory, is as follows: the allowed user presents a RFID card to the reader based on Odalid system [4]. The card ID, time and date of authorized access are checked using connection to an online server. In the same time, multi-modality identity ve…

Support Vector MachineReal-time Image ProcessingBiometricsSmart CameraFace VerificationEigenFacesFace Detection[INFO.INFO-ES]Computer Science [cs]/Embedded Systems[ INFO.INFO-ES ] Computer Science [cs]/Embedded Systems[INFO.INFO-ES] Computer Science [cs]/Embedded Systems
researchProduct

MR-guided focused ultrasound application for moving target tumor ablation in abdominal area: Coil selection

2020

PubMed: 32276552

SwineThermal ablationMagnetic Resonance Imaging InterventionalTumor ablationFocused ultrasound030218 nuclear medicine & medical imagingMagnetic resonance guided focused ultrasound surgery03 medical and health sciencesCE marking0302 clinical medicineEcho planar imagingAbdomenAnimalsHumansMedicineRadiology Nuclear Medicine and imagingRadiological and Ultrasound TechnologyEcho-Planar ImagingPhantoms Imagingbusiness.industryCoils magnetic resonance thermometry tracking echo planar imaging magnetic resonance-guided focused-ultrasound surgery CE marking validation verificationTrackingLiver NeoplasmsVerificationSettore MED/37 - NeuroradiologiaCoilsGeneral MedicineFocused ultrasound surgeryDisease Models AnimalLiverMagnetic resonance thermometryElectromagnetic coil030220 oncology & carcinogenesisHigh-Intensity Focused Ultrasound AblationbusinessSettore MED/36 - Diagnostica Per Immagini E RadioterapiaMri guidedMagnetic resonance thermometryBiomedical engineering
researchProduct

Abitare nel reale. Dalla crisi della periferia alla tessitura di nuove relazioni contestuali

2019

I progetti redatti per “Palermo Sud-Est” sono il risultato di un Laboratorio di Laurea strutturatosi attraverso incontri, seminari, comunicazioni specialistiche, esposizioni critiche, che – in una strategia condivisa – ha visto ogni studente elaborare il proprio lavoro nel confronto con gli altri attori del Laboratorio stesso. La ricerca sui “progetti urbani” è stata impostata di modo che ogni laureando fosse messo a conoscenza dei progetti svolti nello stesso ambito territoriale dai colleghi che l’avevano preceduto, così da poter operare in continuità e contribuire a formulare un ragionamento unitario, nel quale ogni progetto costituisse continuazione, verifica o anche variante dei precede…

The projects prepared for "Palermo South-East" are the result of a Graduate Laboratory structured through meetings seminars specialist communications critical exhibitions which - in a shared strategy - saw each student elaborate their work in comparison with others actors of the same Laboratory. The research on "urban projects" was set so that each graduating student was made aware of the projects carried out in the same geographical area by the colleagues who had preceded it so as to be able to operate in continuity and contribute to formulating a unitary reasoning in which each project constituted continuation verification or even variant of the previous ones. These coordinated works have pursued two fundamental objectives: the strengthening of infrastructures and the establishment of specialized public buildings with superior functions aimed at requalifying and regenerating various critical situations with particular attention to the relationship between context and life scenarios. Thus each designer while dealing with a main functional program simultaneously deals with various issues such as the rationalization of the road system the redevelopment of existing buildings the design and refunctionalization of urban services (for example the transformed Central Station in the hotel or the project of a great Mosque)several degree theses have addressed as the main theme or as a question in the background the design of a new bed for the Oreto river and the relative establishment of a park facing it. In this desire to "patch up the wounds" in the different areas of "Palermo South-East" in close relationship with the vicissitudes of the place there is a continuous reference to architectures of all time and some questions involving the functional program are suggested - that identifies the character (or perhaps "type") of what is to be inserted in a given context - and the qualities of living reality as a pivotal material in the design process.Settore ICAR/14 - Composizione Architettonica E Urbana
researchProduct

Epistemic and didactic values of the demonstrative process in different cultures: a case study in Geometry with Chinese and Italian students

2011

This paper presents same key findings of the research project conducted by G.R.I.M. of Palermo on the approaches to justification and proof in Geometry by investigating how Chinese and Italian teachers and students taught particular geometrical topics refereed to different epistemic and didactic values related to own culture. It was found that Chinese teachers and students emphasized justification of the proof by a stressed visual verification based on some metarules linked with the structure of their own written language and defined as historical Chinese modus operandi in the Jiuzhang Suanshu. The Italians paid close attention to mathematical proof by a hypoxemic deductive system defined on the Euclide’ Elements. The geometrical problem discussed on the paper was defined and presented as “one problem multiple solution problems” and “one problem multiple changes”. Important aspect of the case study discussed in the paper focus on the mediation of knowledge between Chinese and Italian students involved in multicultural class. According to us these kind of activities can establish possibilities for the students to confront their self with different cultural social and educational prospective of knowledge discovering the power of mathematics as tool of negotiation in multicultural class?Settore MAT/04 - Matematiche Complementari
researchProduct

Extending SPARQL with Temporal Logic

2009

The data integration and sharing activities carried on in the framework of the Semantic Web lead to large knowledge bases that must be queried, analyzed, and exploited efficiently. Many of the knowledge representation languages of the Semantic Web, starting with RDF, are based on directed, labeled graphs, which can be also manipulated using graph algorithms and tools coming from other domains. In this paper, we propose an analysis approach of RDF graphs by reusing the verification technology developed for concurrent systems. To this purpose, we define a translation from the SPARQL query language into XTL, a general-purpose graph manipulation language implemented in the CADP verification too…

[ INFO.INFO-MO ] Computer Science [cs]/Modeling and Simulation[INFO.INFO-LO] Computer Science [cs]/Logic in Computer Science [cs.LO][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB][INFO.INFO-WB] Computer Science [cs]/Web[INFO.INFO-WB]Computer Science [cs]/Web[ INFO.INFO-WB ] Computer Science [cs]/WebInformationSystems_DATABASEMANAGEMENTlabeled transition system[INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]ACM : H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.3: Languages/H.2.3.3: Query languagesSPARQL[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulationmodel checkingRDFACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checking[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]temporal logicACM : D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checking[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB][ INFO.INFO-LO ] Computer Science [cs]/Logic in Computer Science [cs.LO]ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.3: Languages/H.2.3.3: Query languages[INFO.INFO-MO] Computer Science [cs]/Modeling and Simulationverification
researchProduct

A spatial role-based authorization framework for sensor network-assisted indoor WLANs

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…

business.industryComputer scienceData securityPermissionlaw.inventionResource (project management)lawServerVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Wi-FiMobile telephonybusinessWireless sensor networkFormal verificationComputer network2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
researchProduct

Smart Technologies for Improved Software Maintenance

2015

Steadily increasing complexity of software systems makes them difficult to configure and use without special IT knowledge. One of the solutions is to improve software systems making them “smarter”, i.e. to supplement software systems with features of self-management, at least partially. This paper describes several software components known as smart technologies, which facilitate software use and maintenance. As to date smart technologies incorporate version updating, execution environment testing, self-testing, runtime verification and business process execution. The proposed approach has been successfully applied in several software projects.

business.industryComputer scienceSoftware developmentSoftware maintenancecomputer.software_genreSoftware analyticsSoftware constructionOperating systemPackage development processBackportingSoftware systemSoftware verification and validationbusinessSoftware engineeringcomputerAnnals of Computer Science and Information Systems
researchProduct

A Case Study of Open Source Software Development in Proteomic Area: The LIMS ePims

2008

The objective of this paper is to provide an illustrative feedback on development of Open Source software among several partners. We describe the first stage of the design of a specific software package, namely a customized Laboratory Information Management System (LIMS) for biology applications. This software package is structured in several modules which are reusable and can be customized for other applications. In this paper, we address the problem of multi-licensing for the same software tools due to the participation of several partners, the reuse of code source, and the subsequent distribution of this produced software.

business.industryComputer scienceSoftware developmentcomputer.software_genreSoftware peer reviewSoftware frameworkSoftware analyticsSoftware constructionOperating systemPackage development processSoftware verification and validationSoftware systembusinessSoftware engineeringcomputer2008 IEEE International Conference on Signal Image Technology and Internet Based Systems
researchProduct