Sciweavers

272 search results - page 40 / 55
» Detecting Altered Fingerprints
Sort
View
BMCBI
2010
131views more  BMCBI 2010»
14 years 12 months ago
JISTIC: Identification of Significant Targets in Cancer
Background: Cancer is caused through a multistep process, in which a succession of genetic changes, each conferring a competitive advantage for growth and proliferation, leads to ...
Felix Sanchez-Garcia, Uri David Akavia, Eyal Mozes...
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 6 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
IH
2007
Springer
15 years 5 months ago
Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries
In this paper, we describe a new forensic tool for revealing digitally altered images by detecting the presence of photo-response non-uniformity noise (PRNU) in small regions. This...
Mo Chen, Jessica J. Fridrich, Jan Lukás, Mi...
AINA
2010
IEEE
15 years 4 months ago
Active Data Selection for Sensor Networks with Faults and Changepoints
Abstract—We describe a Bayesian formalism for the intelligent selection of observations from sensor networks that may intermittently undergo faults or changepoints. Such active d...
Michael A. Osborne, Roman Garnett, Stephen J. Robe...
ICSM
2007
IEEE
15 years 6 months ago
Matching Control Flow of Program Versions
In many application areas, including piracy detection, software debugging and maintenance, situations arise in which there is a need for comparing two versions of a program that d...
Vijayanand Nagarajan, Rajiv Gupta, Matias Madou, X...