It is widely believed that content-signature-based intrusion detection systems (IDSes) are easily evaded by polymorphic worms, which vary their payload on every infection attempt....
This paper is concerned with the development of a computational methodology based on fractal geometry for determining 3D structure of protein with imagery projection operations. I...
Signature identification and verification has been a topic of interest and importance for many years in the area of biometrics. In this paper we present an effective method to per...
Stephane Armand, Michael Blumenstein, Vallipuram M...
We introduce and formally define polynomial commitment schemes, and provide two efficient constructions. A polynomial commitment scheme allows a committer to commit to a polynomial...
In this paper, we develop a new approach for texture classification independent of affine transforms. Based on spectral representation of texture images under affine transform, an...