Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,378,927 papers from all fields of science
Search
Sign In
Create Free Account
Address Verification System
Known as:
AVS
, Address verification
The Address Verification System (AVS) is a system used to verify the address of a person claiming to own a credit card. The system will check the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Broader (1)
E-commerce
Fax
Payment gateway
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Enhanced Prediction Models for Predicting Spatial Visualization (VZ) in Address Verification Task
Thitivatr Patanasakpinyo
,
Georgi I. Batinov
,
Kofi C. Whitney
,
A. Sulaiman
,
L. Miller
International Conference on Computers and Their…
2019
Corpus ID: 181604816
In the field of Human Computer Interaction and Psychology, it is accepted that spatial visualization (VZ) is one ability that can…
Expand
2018
2018
Automated Parsing of Geographical Addresses: A Multilayer Feedforward Neural Network Based Approach
Shikhar Sharma
,
R. Ratti
,
Isha Arora
,
Anshul Solanki
,
Gaurav Bhatt
International Computer Science Conference
2018
Corpus ID: 4872803
Delivering mails and parcels is an age-old problem. With the advent of E-Commerce, one can now get almost everything delivered…
Expand
2018
2018
Deployment of Intrusion Prevention System on Multi-Core Processor Based Security Hardware
K. Swetha
,
Ravi Dara
International Journal of Computer Networks…
2018
Corpus ID: 51742863
After tightening up network perimeter for dealing with external threats, organizations have woken up to the threats from inside…
Expand
2014
2014
Filter-based address autoconfiguration protocol (FAACP) for duplicate address detection and recovery in MANETs
T. Reshmi
,
K. Murugan
Computing
2014
Corpus ID: 254060935
Assigning unique addresses to the nodes in mobile ad-hoc networks is a challenging issue due to dynamic topology, resource…
Expand
Review
2011
Review
2011
Texas Department of Transportation Design-Build Quality Assurance Program (QAP): Lessons Learned and Development of an FHWA-Approved Statewide Program
G. Cleveland
,
W. O. Tam
,
Jeffrey Seiders
,
James E Travis
2011
Corpus ID: 107362864
The SH 130 (Segments 1 through 4) and 183A design-build projects with contractor quality control acceptance testing were…
Expand
2010
2010
Modeling and Simulation of Legacy Embedded Systems
P. Derler
,
Edward A. Lee
2010
Corpus ID: 9445098
This paper describes a modeling formalism that specifically addresses description and performance analysis of simulators for…
Expand
2009
2009
Maintaining a Safe Environment for Payment Cards : CONFERENCE SUMMARY Examining Evolving Threats Posed
Susan Herbst-Murphy
,
ConFerenCe SUMMAry
2009
Corpus ID: 14134961
2008
2008
In-Depth Look at the Host Identity Protocol ( HIP ) : Providing Agile Mobility , Multi-Homing , and Security
Dr. Pekka Nikander
2008
Corpus ID: 31752366
The Host Identity Protocol (HIP) is an experimental architecture and protocol, being developed at the IETF since 1999 and…
Expand
Review
2004
Review
2004
Verification and Validation People Can Be More Than Technical Advisors
G. Jackelen
2004
Corpus ID: 62250713
address verification and validation (V&V). To some, the V&V descriptions are too narrow and restrictive of the V&V abilities. As…
Expand
2003
2003
2 Broker : a key middleware pattern
J. Hugues
,
L. Pautet
,
F. Kordon
2003
Corpus ID: 11573269
The development of real-time, dependable or scalable distributed applications requires specific middleware that enables the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required