Sciweavers

415 search results - page 12 / 83
» Intruders pattern identification
Sort
View
JCC
2002
88views more  JCC 2002»
14 years 9 months ago
Pattern recognition strategies for molecular surfaces. I. Pattern generation using fuzzy set theory
: A new method for the characterization of molecules based on the model approach of molecular surfaces is presented. We use the topographical properties of the surface as well as t...
Thomas E. Exner, Matthias Keil, Jürgen Brickm...
ASPDAC
1998
ACM
65views Hardware» more  ASPDAC 1998»
15 years 2 months ago
A Redundant Fault Identification Algorithm with Exclusive-OR Circuit Reduction
−This paper describes a new redundant fault identification algorithm with Exclusive-OR circuit reduction. The experimental results using this algorithm with a FAN-based test patt...
Miyako Tandai, Takao Shinsha
MVA
2002
144views Computer Vision» more  MVA 2002»
14 years 9 months ago
Fingerprint Identification Using the Accidental Coincidence Probability
A method of comparing and identifying two patterns is proposed based on the accidental coincidence probability of the patterns' features. The probability is calculated under ...
Akira Monden, Seiji Yoshimoto
FSTTCS
2003
Springer
15 years 3 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
ICPR
2006
IEEE
15 years 11 months ago
Biometric Identification of Mice
We present a new application area for biometric recognition: the identification of laboratory animals to replace today's invasive methods. Through biometric identification a ...
Kenneth Nilsson, Thorsteinn S. Rögnvaldsson, ...