Sciweavers

109 search results - page 15 / 22
» Identity Based Undeniable Signatures
Sort
View
ICASSP
2009
IEEE
14 years 3 months ago
Design of a morphological moving object signature and application to human identification
Many computer vision systems try to infer semantic information about a video scene content by looking at the time series of the silhouettes of the moving objects. This paper propo...
Olivier Barnich, Marc Van Droogenbroeck
ACSC
2002
IEEE
14 years 1 months ago
Signature Extraction for Overlap Detection in Documents
Easy access to the Web has led to increased potential for students cheating on assignments by plagiarising others’ work. By the same token, Web-based tools offer the potential f...
Raphael A. Finkel, Arkady B. Zaslavsky, Kriszti&aa...
BMCBI
2010
123views more  BMCBI 2010»
13 years 8 months ago
Prediction of breast cancer prognosis using gene set statistics provides signature stability and biological context
Background: Different microarray studies have compiled gene lists for predicting outcomes of a range of treatments and diseases. These have produced gene lists that have little ov...
Gad Abraham, Adam Kowalczyk, Sherene Loi, Izhak Ha...
CORR
2011
Springer
151views Education» more  CORR 2011»
13 years 3 months ago
A Simulation Experiment on a Built-In Self Test Equipped with Pseudorandom Test Pattern Generator and Multi-Input Shift Register
This paper investigates the impact of the changes of the characteristic polynomials and initial loadings, on behaviour of aliasing errors of parallel signature analyzer (Multi-Inp...
A. Ahmad
IJNSEC
2010
152views more  IJNSEC 2010»
13 years 3 months ago
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet a...
Ramanarayana Kandikattu, Lillykutty Jacob