Sciweavers

2492 search results - page 44 / 499
» On the General Signature Trees
Sort
View
ICISC
2004
122views Cryptology» more  ICISC 2004»
13 years 9 months ago
Steganography for Executables and Code Transformation Signatures
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techn...
Bertrand Anckaert, Bjorn De Sutter, Dominique Chan...
PAMI
2006
99views more  PAMI 2006»
13 years 7 months ago
Symbolic Signatures for Deformable Shapes
Recognizing classes of objects from their shape is an unsolved problem in machine vision that entails the ability of a computer system to represent and generalize complex geometric...
Salvador Ruiz-Correa, Linda G. Shapiro, Marina Mei...
WWW
2007
ACM
14 years 8 months ago
Mining contiguous sequential patterns from web logs
Finding Contiguous Sequential Patterns (CSP) is an important problem in Web usage mining. In this paper we propose a new data structure, UpDown Tree, for CSP mining. An UpDown Tre...
Jinlin Chen, Terry Cook
STOC
2005
ACM
130views Algorithms» more  STOC 2005»
14 years 8 months ago
Low-distortion embeddings of general metrics into the line
A low-distortion embedding between two metric spaces is a mapping which preserves the distances between each pair of points, up to a small factor called distortion. Low-distortion...
Mihai Badoiu, Julia Chuzhoy, Piotr Indyk, Anastasi...
ICB
2007
Springer
185views Biometrics» more  ICB 2007»
14 years 1 months ago
Biometric Hashing Based on Genetic Selection and Its Application to On-Line Signatures
We present a general biometric hash generation scheme based on vector quantization of multiple feature subsets selected with genetic optimization. The quantization of subsets overc...
Manuel R. Freire, Julian Fiérrez-Aguilar, J...