Sciweavers

1437 search results - page 15 / 288
» Content Extraction Signatures
Sort
View
DATE
1998
IEEE
100views Hardware» more  DATE 1998»
13 years 11 months ago
Self-Adjusting Output Data Compression: An Efficient BIST Technique for RAMs
After write operations, BIST schemes for RAMs relying on signature analysis must compress the entire memory contents to update the reference signature. This paper introduces a new...
Vyacheslav N. Yarmolik, Sybille Hellebrand, Hans-J...
CCS
2004
ACM
14 years 23 days ago
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Ernest F. Brickell, Jan Camenisch, Liqun Chen
IJCNN
2006
IEEE
14 years 1 months ago
Off-line Signature Verification using the Enhanced Modified Direction Feature and Neural-based Classification
—Signatures continue to be an important biometric for authenticating the identity of human beings. This paper presents an effective method to perform off-line signature verificat...
Stephane Armand, Michael Blumenstein, Vallipuram M...
ICWE
2009
Springer
14 years 1 months ago
A Layout-Independent Web News Article Contents Extraction Method Based on Relevance Analysis
Abstract. The traditional Web news article contents extraction methods are time-costly and need much maintenance because they analyze the layout of news pages to generate the wrapp...
Hao Han, Takehiro Tokuda
ICIP
2003
IEEE
14 years 9 months ago
Fast similarity search on video signatures
Video signatures are compact representations of video sequences designed for efficient similarity measurement. In this paper, we propose a feature extraction technique to support ...
Sen-Ching S. Cheung, Avideh Zakhor