Sciweavers

1437 search results - page 29 / 288
» Content Extraction Signatures
Sort
View
ICDAR
2003
IEEE
14 years 21 days ago
A Hybrid On/Off Line Handwritten Signature Verification System
This paper proposes a new hybrid handwritten signature verification system where the on-line reference data acquired through a digitizing tablet serves as the basis for the segmen...
Alessandro Zimmer, Luan Ling Lee
CCS
2009
ACM
14 years 2 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
VLSISP
2008
103views more  VLSISP 2008»
13 years 5 months ago
Power Signature Watermarking of IP Cores for FPGAs
In this paper, we introduce a new method for watermarking of IP cores for FPGA architectures where the signature (watermark) is detected at the power supply pins of the FPGA. This ...
Daniel Ziener, Jürgen Teich
PAM
2010
Springer
14 years 2 months ago
Network DVR: A Programmable Framework for Application-Aware Trace Collection
Network traces are essential for a wide range of network applications, including traffic analysis, network measurement, performance monitoring, and security analysis. Existing cap...
Chia-Wei Chang, Alexandre Gerber, Bill Lin, Subhab...
CIVR
2003
Springer
107views Image Analysis» more  CIVR 2003»
14 years 19 days ago
A Novel Scheme for Video Similarity Detection
In this paper, a new two-phase scheme for video similarity detection is proposed. For each video sequence, we extract two kinds of signatures with different granularities: coarse ...
Chu-Hong Hoi, Wei Wang, Michael R. Lyu