Sciweavers

1513 search results - page 146 / 303
» Cryptographic Pattern Matching
Sort
View
UIST
1998
ACM
15 years 6 months ago
A User Interface Using Fingerprint Recognition: Holding Commands and Data Objects on Fingers
This paper describes a new user interface, called a fingerprint user interface (FUI), which employs fingerprint recognition. While the unique feature patterns of fingerprints have...
Atsushi Sugiura, Yoshiyuki Koseki
ICASSP
2011
IEEE
14 years 6 months ago
Towards robust word discovery by self-similarity matrix comparison
Word discovery is the task of discovering and collecting occurrences of repeating words in the absence of prior acoustic and linguistic knowledge, or training material. The capabi...
Armando Muscariello, Guillaume Gravier, Fré...
DSD
2009
IEEE
95views Hardware» more  DSD 2009»
15 years 9 months ago
The Parallel Sieve Method for a Virus Scanning Engine
This paper shows a new architecture for a virus scanning system, which is different from that of an intrusion detection system. The proposed method uses two-stage matching: In the...
Hiroki Nakahara, Tsutomu Sasao, Munehiro Matsuura,...
115
Voted
CC
2005
Springer
123views System Software» more  CC 2005»
15 years 7 months ago
XML Goes Native: Run-Time Representations for Xtatic
Abstract. Xtatic is a lightweight extension of C offering native support for statically typed XML processing. XML trees are built-in values in Xtatic, and static analysis of the t...
Vladimir Gapeyev, Michael Y. Levin, Benjamin C. Pi...
AMAST
2006
Springer
15 years 6 months ago
Formal Islands
Abstract. Motivated by the proliferation and usefulness of Domain Specific Languages as well as the demand in enriching well established languages by high level capabilities like p...
Emilie Balland, Claude Kirchner, Pierre-Etienne Mo...