Sciweavers

92 search results - page 11 / 19
» Hidden Identity-Based Signatures
Sort
View
ICDAR
2003
IEEE
14 years 23 days ago
On-line Signature Verification Using Local Shape Analysis
This paper presents a novel approach to the on-line signature verification using local shape Analysis. First, segment the input signature into several segments using HMM (Hidden M...
Mingfu Zou, Jianjun Tong, Changping Liu, Zhenglian...
CCS
2009
ACM
14 years 2 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
KR
2010
Springer
14 years 8 days ago
Pushing the Limits of Reasoning over Ontologies with Hidden Content
There is currently a growing interest in techniques for hiding parts of the signature of an ontology Kh that is being reused by another ontology Kv. Towards this goal, Cuenca Grau...
Bernardo Cuenca Grau, Boris Motik
ICDAR
2009
IEEE
13 years 5 months ago
A Multi-Hypothesis Approach for Off-Line Signature Verification with HMMs
In this paper, an approach based on the combination of discrete Hidden Markov Models (HMMs) in the ROC space is proposed to improve the performance of off-line signature verificat...
Luana Batista, Eric Granger, Robert Sabourin
NIPS
2000
13 years 8 months ago
Discovering Hidden Variables: A Structure-Based Approach
A serious problem in learning probabilistic models is the presence of hidden variables. These variables are not observed, yet interact with several of the observed variables. As s...
Gal Elidan, Noam Lotner, Nir Friedman, Daphne Koll...