Sciweavers

763 search results - page 134 / 153
» Digital Signatures Today
Sort
View
FUIN
2007
129views more  FUIN 2007»
13 years 8 months ago
Sound Isolation by Harmonic Peak Partition For Music Instrument Recognition
Abstract. Identification of music instruments in polyphonic sounds is difficult and challenging, especially where heterogeneous harmonic partials are overlapping with each other....
Xin Zhang, Zbigniew W. Ras
BMCBI
2004
134views more  BMCBI 2004»
13 years 8 months ago
Bayesian model accounting for within-class biological variability in Serial Analysis of Gene Expression (SAGE)
Background: An important challenge for transcript counting methods such as Serial Analysis of Gene Expression (SAGE), "Digital Northern" or Massively Parallel Signature ...
Ricardo Z. N. Vêncio, Helena Brentani, Diogo...
SSS
2010
Springer
154views Control Systems» more  SSS 2010»
13 years 7 months ago
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure
Abstract. Given a public-key infrastructure (PKI) and digital signatures, it is possible to construct broadcast protocols tolerating any number of corrupted parties. Almost all exi...
S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Ar...
ISSTA
2012
ACM
11 years 11 months ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...
EUROSYS
2008
ACM
14 years 5 months ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman