Sciweavers

1437 search results - page 11 / 288
» Content Extraction Signatures
Sort
View
APSEC
2004
IEEE
13 years 11 months ago
Accurate Call Graph Extraction of Programs with Function Pointers Using Type Signatures
Software engineers need to understand programs in order to effectively maintain them. The call graph, which presents the calling relationships between functions, is a useful repre...
Darren C. Atkinson
TIP
1998
109views more  TIP 1998»
13 years 7 months ago
Extraction of signatures from check background based on a filiformity criterion
—Extracting a signature from a check with patterned background is a thorny problem in image segmentation. Methods based on threshold techniques often necessitate meticulous postp...
Salim Djeziri, Fathallah Nouboud, Réjean Pl...
DICTA
2003
13 years 8 months ago
Automatic Extraction of Signatures from Bank Cheques and Other Documents
: An innovative approach for extracting signatures from bank cheque  images and other documents is proposed based on the integration of the crop  method  wi...
Vamsi Krishna Madasu, Mohd. Hafizuddin Mohd. Yusof...
CEAS
2004
Springer
14 years 23 days ago
The Impact of Feature Selection on Signature-Driven Spam Detection
Signature-driven spam detection provides an alternative to machine learning approaches and can be very effective when near-duplicates of essentially the same message are sent in h...
Aleksander Kolcz, Abdur Chowdhury, Joshua Alspecto...
IJNSEC
2011
143views more  IJNSEC 2011»
13 years 2 months ago
Probable Security Proof of A Blind Signature Scheme over Braid Groups
In this paper, we reinvestigate the security analysis of blind signature scheme over braid groups proposed by Verma in 2008. A blind signature scheme is a cryptographic primitive ...
Girraj Kumar Verma