Sciweavers

380 search results - page 24 / 76
» Time Capsule Signature
Sort
View
EVOW
2004
Springer
14 years 1 months ago
Aesthetic Video Filter Evolution in an Interactive Real-Time Framework
A data-flow network-based interactive evolutionary design framework is presented which will provide a testbed for the development and exploration of a diverse range of visual arti...
Matthew Lewis
CCS
2003
ACM
14 years 1 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
ACSAC
2003
IEEE
14 years 1 months ago
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS
Over the past decade, Intrusion Detection Systems (IDS) have improved steadily in the efficiency and effectiveness with which they detect intrusive activity. This is particularly ...
Nathan Carey, George M. Mohay, Andrew Clark
DPHOTO
2010
208views Hardware» more  DPHOTO 2010»
13 years 10 months ago
A signature analysis based method for elliptical shape
The high level context image analysis regards many fields as face recognition, smile detection, automatic red eye removal, iris recognition, fingerprint verification, etc. Techniq...
Ivana Guarneri, Mirko Guarnera, Giuseppe Messina, ...
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 8 months ago
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial tha...
Mueen Uddin, Azizah Abdul Rahman