Sciweavers

6574 search results - page 54 / 1315
» Current Signatures: Application
Sort
View
MOBICOM
2010
ACM
13 years 11 months ago
ZiFi: wireless LAN discovery via ZigBee interference signatures
WiFi networks have enjoyed an unprecedent penetration rate in recent years. However, due to the limited coverage, existing WiFi infrastructure only provides intermittent connectiv...
Ruogu Zhou, Yongping Xiong, Guoliang Xing, Limin S...
ICIP
2004
IEEE
15 years 11 days ago
A new similarity measure using hausdorff distance map
Image dissimilarity measure is a hot topic. The measure process is generally composed of an information mining in each image which results in an image signature and then a signatu...
Etienne Baudrier, Frédéric Nicolier,...
SAC
2009
ACM
14 years 5 months ago
Network protocol interoperability testing based on contextual signatures and passive testing
This paper presents a methodology for interoperability testing based on contextual signatures and passive testing with invariants. The concept of contextual signature offers a fra...
Fatiha Zaïdi, Emmanuel Bayse, Ana R. Cavalli
SISAP
2010
IEEE
243views Data Mining» more  SISAP 2010»
13 years 8 months ago
Similarity matrix compression for efficient signature quadratic form distance computation
Determining similarities among multimedia objects is a fundamental task in many content-based retrieval, analysis, mining, and exploration applications. Among state-of-the-art sim...
Christian Beecks, Merih Seran Uysal, Thomas Seidl
CHES
2000
Springer
86views Cryptology» more  CHES 2000»
14 years 3 months ago
MiniPASS: Authentication and Digital Signatures in a Constrained Environment
Abstract. We describe an implementation of the PASS polynomial authentication and signature scheme [5, 6] that is suitable for use in highly constrained environments such as SmartC...
Jeffrey Hoffstein, Joseph H. Silverman