Sciweavers

754 search results - page 44 / 151
» Generation of Signatures by Deformations
Sort
View
CIKM
2011
Springer
12 years 8 months ago
LogSig: generating system events from raw textual logs
Modern computing systems generate large amounts of log data. System administrators or domain experts utilize the log data to understand and optimize system behaviors. Most system ...
Liang Tang, Tao Li, Chang-Shing Perng
ISBI
2008
IEEE
14 years 9 months ago
Texture-driven coronary artery plaque characterization using wavelet packet signatures
High-frequency ultrasound transducers are being widely used to generate high resolution, real time, cross-sectional images of the coronary arteries. In this paper, we present a ro...
Amin Katouzian, Babak Baseri, Elisa E. Konofagou, ...
EUROCRYPT
2001
Springer
14 years 1 months ago
Practical Threshold RSA Signatures without a Trusted Dealer
We propose a threshold RSA scheme which is as efficient as the fastest previous threshold RSA scheme (by Shoup), but where two assumptions needed in Shoup’s and in previous schem...
Ivan Damgård, Maciej Koprowski
ACMSE
2004
ACM
14 years 2 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
SIBGRAPI
2000
IEEE
14 years 1 months ago
An Off-Line Signature Verification System using Hidden Markov Model and Cross-Validation
This work has as main objective to present an off-line signature verification system. It is basically divided into three parts. The first one demonstrates a pre-processing process,...
Edson J. R. Justino, Abdenaim El Yacoubi, Fl&aacut...