Sciweavers

1356 search results - page 201 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
ICDAR
2009
IEEE
14 years 2 months ago
A Set of Chain Code Based Features for Writer Recognition
This communication presents an effective method for writer recognition in handwritten documents. We have introduced a set of features that are extracted from the contours of handw...
Imran Siddiqi, Nicole Vincent
TVCG
2008
112views more  TVCG 2008»
13 years 8 months ago
VisComplete: Automating Suggestions for Visualization Pipelines
Building visualization and analysis pipelines is a large hurdle in the adoption of visualization and workflow systems by domain scientists. In this paper, we propose techniques to ...
David Koop, Carlos Eduardo Scheidegger, Steven P. ...
TACAS
2004
Springer
108views Algorithms» more  TACAS 2004»
14 years 1 months ago
The Succinct Solver Suite
Abstract. The Succinct Solver Suite offers two analysis engines for solving data and control flow problems expressed in clausal form in a large fragment of first order logic. Th...
Flemming Nielson, Hanne Riis Nielson, Hongyan Sun,...
WEWORC
2007
162views Cryptology» more  WEWORC 2007»
13 years 9 months ago
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
The stream ciphers Py, Pypy and Py6 were designed by Biham and Seberry for the ECRYPT-eSTREAM project in 2005. The ciphers were promoted to the ‘Focus’ ciphers of the Phase II ...
Gautham Sekar, Souradyuti Paul, Bart Preneel
BMCBI
2011
12 years 11 months ago
Detection of Lineage-Specific Evolutionary Changes among Primate Species
Background: Comparison of the human genome with other primates offers the opportunity to detect evolutionary events that created the diverse phenotypes among the primate species. ...
Mihaela Pertea, Geo Pertea, Steven L. Salzberg