Sciweavers

1629 search results - page 86 / 326
» A Study of Malcode-Bearing Documents
Sort
View
109
Voted
LWA
2004
15 years 4 months ago
Experiments in Term Weighting and Keyword Extraction in Document Clustering
We study methods to initialize or bias different clustering methods using prior information about the "importance" of a keyword w.r.t. the whole document collection or a...
Christian Borgelt, Andreas Nürnberger
96
Voted
CHI
2008
ACM
16 years 3 months ago
Evaluating touch gestures for scrolling on notebook computers
We describe a new circular touch gesture for scrolling called ChiralMotionTM and report on work to measure its performance. In a study using a document scrolling task, ChiralMotio...
Kevin Wayne Arthur, Nada Matic, Paul Ausbeck
115
Voted
ICDAR
2009
IEEE
15 years 10 months ago
Toward Resisting Forgery Attacks via Pseudo-Signatures
Recent work has shown that certain handwriting biometrics are susceptible to forgery attacks, both human- and machine-based. In this paper, we examine a new scheme for using handw...
Jin Chen, Daniel P. Lopresti, Fabian Monrose
129
Voted
ICDAR
2009
IEEE
15 years 10 months ago
Capturing Reliable Data for Computer-Based Forensic Handwriting Analysis II: Pen-position Activations
The forensic investigation of a questioned signature written on a piece of paper is a challenging task. Electronic pen-tablets for recording writing movements are considered valua...
Katrin Franke
124
Voted
IWPSE
2005
IEEE
15 years 9 months ago
Supporting Web Application Evolution by Dynamic Analysis
The evolution of Web Applications needs to be supported by the availability of proper analysis and design documents. UML use case diagrams are certainly useful to identify feature...
Giuseppe A. Di Lucca, Massimiliano Di Penta, Anna ...