Sciweavers

683 search results - page 77 / 137
» Unique Group Signatures
Sort
View
FLAIRS
2008
15 years 2 months ago
Contrast Pattern Mining with Gap Constraints for Peptide Folding Prediction
1 In this paper, we propose a peptide folding prediction method which discovers contrast patterns to differentiate and predict peptide folding classes. A contrast pattern is defin...
Chinar C. Shah, Xingquan Zhu, Taghi M. Khoshgoftaa...
ICASSP
2010
IEEE
14 years 10 months ago
CBCD based on color features and landmark MDS-assisted distance estimation
Content-Based Copy Detection (CBCD) of digital videos is an important research field that aims at the identification of modified copies of an original clip, e.g., on the Intern...
Marzia Corvaglia, Fabrizio Guerrini, Riccardo Leon...
JCS
2010
121views more  JCS 2010»
14 years 10 months ago
Computational soundness of symbolic zero-knowledge proofs
raction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significa...
Michael Backes, Dominique Unruh
MTA
2010
116views more  MTA 2010»
14 years 10 months ago
Performing content-based retrieval of humans using gait biometrics
In order to analyse surveillance video, we need to efficiently explore large datasets containing videos of walking humans. At survei llance-image resolution, the human walk (their ...
Sina Samangooei, Mark S. Nixon
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 8 days ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan