Sciweavers

591 search results - page 35 / 119
» Securing the Broker Pattern
Sort
View
TSDM
2000
151views Data Mining» more  TSDM 2000»
14 years 6 days ago
Identifying Temporal Patterns for Characterization and Prediction of Financial Time Series Events
The novel Time Series Data Mining (TSDM) framework is applied to analyzing financial time series. The TSDM framework adapts and innovates data mining concepts to analyzing time ser...
Richard J. Povinelli
DELTA
2008
IEEE
14 years 3 months ago
AES-Based BIST: Self-Test, Test Pattern Generation and Signature Analysis
Re-using embedded resources for implementing builtin self test mechanisms allows test cost reduction. In this paper we demonstrate how to implement costefficient built-in self tes...
M. Doulcier, Marie-Lise Flottes, Bruno Rouzeyre
ICMCS
2010
IEEE
171views Multimedia» more  ICMCS 2010»
13 years 9 months ago
Transforming a pattern identifier into biometric key generators
According to a popular pattern recognition method, this paper proposes two methods to generate a secret from individual's biometric information, such as fingerprint feature p...
Yongdong Wu, Bo Qiu
IH
2001
Springer
14 years 1 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
MEDIAFORENSICS
2010
13 years 10 months ago
Efficient estimation of CFA pattern configuration in digital camera images
This paper proposes an efficient method to determine the concrete configuration of the color filter array (CFA) from demosaiced images. This is useful to decrease the degrees of f...
Matthias Kirchner