Sciweavers

3972 search results - page 71 / 795
» Cosparse analysis modeling - uniqueness and algorithms
Sort
View
ICDAR
2003
IEEE
15 years 8 months ago
On-line Signature Verification Using Local Shape Analysis
This paper presents a novel approach to the on-line signature verification using local shape Analysis. First, segment the input signature into several segments using HMM (Hidden M...
Mingfu Zou, Jianjun Tong, Changping Liu, Zhenglian...
144
Voted
SIAMMAX
2010
189views more  SIAMMAX 2010»
14 years 10 months ago
Fast Algorithms for the Generalized Foley-Sammon Discriminant Analysis
Linear Discriminant Analysis (LDA) is one of the most popular approaches for feature extraction and dimension reduction to overcome the curse of the dimensionality of the high-dime...
Lei-Hong Zhang, Li-Zhi Liao, Michael K. Ng
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
15 years 8 months ago
Evolving computer intrusion scripts for vulnerability assessment and log analysis
Evolutionary computation is used to construct undetectable computer attack scripts. Using a simulated operating system, we show that scripts can be evolved to cover their tracks a...
Julien Budynek, Eric Bonabeau, Ben Shargel
TACAS
2005
Springer
78views Algorithms» more  TACAS 2005»
15 years 8 months ago
Separating Fairness and Well-Foundedness for the Analysis of Fair Discrete Systems
Fair discrete systems (FDSs) are a computational model of concurrent programs where fairness assumptions are specified in terms of sets of states. The analysis of fair discrete sy...
Amir Pnueli, Andreas Podelski, Andrey Rybalchenko
FORTE
2009
15 years 1 months ago
Approximated Context-Sensitive Analysis for Parameterized Verification
Abstract. We propose a verification method for parameterized systems with global conditions. The method is based on context-sensitive constraints, a symbolic representation of infi...
Parosh Aziz Abdulla, Giorgio Delzanno, Ahmed Rezin...