Login / Signup
Prioritizing Runtime Verification Violations.
Breno Miranda
Igor Lima
Owolabi Legunsen
Marcelo d'Amorim
Published in:
ICST (2020)
Keyphrases
</>
model checking
neural network
face verification
databases
computer vision
formal verification
signature verification
digital images
verification method
high security
fingerprint verification
cryptographic protocols
real time
objective function
feature selection
search engine
data sets