Sciweavers

868 search results - page 124 / 174
» On Analog Signature Analysis
Sort
View
LPAR
2007
Springer
15 years 3 months ago
Verifying Cryptographic Protocols with Subterms Constraints
Many analysis techniques and decidability results have been obtained for cryptographic protocols. However all of them consider protocols with limited procedures for the processing ...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
IRI
2006
IEEE
15 years 3 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
ICIAR
2005
Springer
15 years 3 months ago
Color Indexing by Nonparametric Statistics
A method for color indexing is proposed that is based upon nonparametric statistical techniques. Nonparametrics compare the ordinal rankings of sample populations, and maintain the...
Ian Fraser, Michael A. Greenspan
ICDAR
2003
IEEE
15 years 3 months ago
Recovery of Writing Sequence of Static Images of Handwriting using UWM
It is generally agreed that an on-line recognition system is always reliable than an off-line one. It is due to the availability of the dynamic information, especially the writing...
Kai Kwong Lau, Pong Chi Yuen, Yuan Yan Tang
ICDAR
2003
IEEE
15 years 3 months ago
Text-indicated Writer Verification Using Hidden Markov Models
We propose an HMM-based text-indicated writer verification method, which is based on a challenge and response type of authentication process. In this method, a different text incl...
Yasushi Yamazaki, Tsuyoshi Nagao, Naohisa Komatsu