Sciweavers

412 search results - page 26 / 83
» Categories for the working mathematician: making the impossi...
Sort
View
JUCS
2008
155views more  JUCS 2008»
13 years 8 months ago
Combining Classifiers in the ROC-space for Off-line Signature Verification
: In this work we present a strategy for off-line signature verification. It takes into account a writer-independent model which reduces the pattern recognition problem to a 2-clas...
Luiz S. Oliveira, Edson J. R. Justino, Robert Sabo...
JUCS
2008
157views more  JUCS 2008»
13 years 8 months ago
Using Conjunctions and Adverbs for Author Verification
: Linguistics and stylistics have been investigated for author identification for quite a while, but recently, we have testified a impressive growth in the volume with which lawyer...
Daniel Pavelec, Luiz S. Oliveira, Edson J. R. Just...
SIGOPS
2008
183views more  SIGOPS 2008»
13 years 8 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti
SAC
2008
ACM
13 years 7 months ago
Author identification using writer-dependent and writer-independent strategies
In this work we discuss author identification for documents written in Portuguese. Two different approaches were compared. The first is the writer-independent model which reduces ...
Daniel Pavelec, Edson J. R. Justino, Leonardo Vida...
CIKM
2011
Springer
12 years 8 months ago
How to carry over historic books into social networks
This paper describes how to make use of e-books that look like printed books in a knowledge network. After an overview of digitalization efforts and current digital library initia...
Heimo Müller, Hermann A. Maurer