Sciweavers

754 search results - page 52 / 151
» Generation of Signatures by Deformations
Sort
View
IJCBDD
2011
112views more  IJCBDD 2011»
13 years 3 months ago
A novel network model identified a 13-gene lung cancer prognostic signature
: This study presents a novel network methodology to identify prognostic gene signatures. Implication networks based on prediction logic are used to construct genome-wide coexpress...
Nancy Lan Guo, Ying-Wooi Wan, Swetha Bose, James D...
PST
2004
13 years 10 months ago
Detection of New Malicious Code Using N-grams Signatures
Signature-based malicious code detection is the standard technique in all commercial anti-virus software. This method can detect a virus only after the virus has appeared and cause...
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray...
IJISEC
2010
87views more  IJISEC 2010»
13 years 7 months ago
How to construct identity-based signatures without the key escrow problem
The inherent key escrow problem is one of the main reasons for the slow adoption of identity-based cryptography. The existing solution for mitigating the key escrow problem is by a...
Tsz Hon Yuen, Willy Susilo, Yi Mu
AINA
2005
IEEE
14 years 2 months ago
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures
Based on the factorization problem, a modified (t, n) threshold group-oriented scheme with message recovery is proposed. In the proposed scheme, any combination of more than t mem...
Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chi...
ICASSP
2011
IEEE
13 years 13 days ago
Human gait parameter estimation based on micro-doppler signatures using particle filters
Monitoring and tracking human activities around restricted areas is an important issue in security and surveillance applications. The movement of different parts of the human body...
M. B. Guldogan, Fredrik Gustafsson, Umut Orguner, ...