Sciweavers

667 search results - page 40 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
IPPS
2007
IEEE
15 years 6 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
ICDAR
2011
IEEE
13 years 11 months ago
Offline Writer Identification Using K-Adjacent Segments
— This paper presents a method for performing offline writer identification by using K-adjacent segment (KAS) features in a bag-of-features framework to model a user’s handwrit...
Rajiv Jain, David S. Doermann
BMCBI
2007
104views more  BMCBI 2007»
14 years 11 months ago
A response to Yu et al. "A forward-backward fragment assembling algorithm for the identification of genomic amplification and de
Background: Yu et al. (BMC Bioinformatics 2007,8: 145+) have recently compared the performance of several methods for the detection of genomic amplification and deletion breakpoin...
Oscar M. Rueda, Ramón Díaz-Uriarte
HASE
2008
IEEE
15 years 6 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
BMCBI
2005
82views more  BMCBI 2005»
14 years 11 months ago
A novel method for prokaryotic promoter prediction based on DNA stability
Background: In the post-genomic era, correct gene prediction has become one of the biggest challenges in genome annotation. Improved promoter prediction methods can be one step to...
Aditi Kanhere, Manju Bansal