Sciweavers

6574 search results - page 62 / 1315
» Current Signatures: Application
Sort
View
ECCV
2008
Springer
15 years 20 days ago
Keypoint Signatures for Fast Learning and Recognition
Abstract. Statistical learning techniques have been used to dramatically speed-up keypoint matching by training a classifier to recognize a specific set of keypoints. However, the ...
Michael Calonder, Vincent Lepetit, Pascal Fua
ESORICS
2009
Springer
14 years 2 months ago
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security...
Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia,...
TPDS
1998
94views more  TPDS 1998»
13 years 10 months ago
Access Control and Signatures via Quorum Secret Sharing
—We suggest a method of controlling the access to a secure database via quorum systems. A quorum system is a collection of sets (quorums) every two of which have a nonempty inter...
Moni Naor, Avishai Wool
APNOMS
2006
Springer
14 years 2 months ago
Novel Traffic Measurement Methodology for High Precision Applications Awareness in Multi-gigabit Networks
Traffic measurement research has focused on various aspects ranging from simple packet-based monitoring to sophisticated flow-based measurement and analysis. Especially, most recen...
Taesang Choi, Sangsik Yoon, Dongwon Kang, Sangwan ...
IJSN
2007
106views more  IJSN 2007»
13 years 10 months ago
Hash-AV: fast virus signature scanning by cache-resident filters
Abstract— Fast virus scanning is becoming increasingly important in today’s Internet. While Moore’s law continues to double CPU cycle speed, virus scanning applications fail ...
Ozgun Erdogan, Pei Cao