Sciweavers

1437 search results - page 15 / 288
» Content Extraction Signatures
Sort
View
142
Voted
DATE
1998
IEEE
100views Hardware» more  DATE 1998»
15 years 9 months ago
Self-Adjusting Output Data Compression: An Efficient BIST Technique for RAMs
After write operations, BIST schemes for RAMs relying on signature analysis must compress the entire memory contents to update the reference signature. This paper introduces a new...
Vyacheslav N. Yarmolik, Sybille Hellebrand, Hans-J...
CCS
2004
ACM
15 years 10 months ago
Direct anonymous attestation
This paper describes the direct anonymous attestation scheme (DAA). This scheme was adopted by the Trusted Computing Group as the method for remote authentication of a hardware mo...
Ernest F. Brickell, Jan Camenisch, Liqun Chen
140
Voted
IJCNN
2006
IEEE
15 years 11 months ago
Off-line Signature Verification using the Enhanced Modified Direction Feature and Neural-based Classification
—Signatures continue to be an important biometric for authenticating the identity of human beings. This paper presents an effective method to perform off-line signature verificat...
Stephane Armand, Michael Blumenstein, Vallipuram M...
130
Voted
ICWE
2009
Springer
15 years 11 months ago
A Layout-Independent Web News Article Contents Extraction Method Based on Relevance Analysis
Abstract. The traditional Web news article contents extraction methods are time-costly and need much maintenance because they analyze the layout of news pages to generate the wrapp...
Hao Han, Takehiro Tokuda
162
Voted
ICIP
2003
IEEE
16 years 6 months ago
Fast similarity search on video signatures
Video signatures are compact representations of video sequences designed for efficient similarity measurement. In this paper, we propose a feature extraction technique to support ...
Sen-Ching S. Cheung, Avideh Zakhor