Sciweavers

476 search results - page 7 / 96
» Analysis of signature change patterns
Sort
View
91
Voted
JUCS
2008
155views more  JUCS 2008»
15 years 7 days ago
Combining Classifiers in the ROC-space for Off-line Signature Verification
: In this work we present a strategy for off-line signature verification. It takes into account a writer-independent model which reduces the pattern recognition problem to a 2-clas...
Luiz S. Oliveira, Edson J. R. Justino, Robert Sabo...
96
Voted
DATE
1998
IEEE
100views Hardware» more  DATE 1998»
15 years 4 months ago
Self-Adjusting Output Data Compression: An Efficient BIST Technique for RAMs
After write operations, BIST schemes for RAMs relying on signature analysis must compress the entire memory contents to update the reference signature. This paper introduces a new...
Vyacheslav N. Yarmolik, Sybille Hellebrand, Hans-J...
118
Voted
BMCBI
2002
147views more  BMCBI 2002»
15 years 3 days ago
Expression profiling of human renal carcinomas with functional taxonomic analysis
Background: Molecular characterization has contributed to the understanding of the inception, progression, treatment and prognosis of cancer. Nucleic acid array-based technologies...
Michael A. Gieseg, Theresa Cody, Michael Z. Man, S...
141
Voted
BMCBI
2010
179views more  BMCBI 2010»
14 years 7 months ago
Circadian signatures in rat liver: from gene expression to pathways
Background: Circadian rhythms are 24 hour oscillations in many behavioural, physiological, cellular and molecular processes that are controlled by an endogenous clock which is ent...
Meric A. Ovacik, Siddharth Sukumaran, Richard R. A...
94
Voted
ACSAC
2007
IEEE
15 years 6 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves