Sciweavers

683 search results - page 77 / 137
» Unique Group Signatures
Sort
View
FLAIRS
2008
15 years 4 months ago
Contrast Pattern Mining with Gap Constraints for Peptide Folding Prediction
1 In this paper, we propose a peptide folding prediction method which discovers contrast patterns to differentiate and predict peptide folding classes. A contrast pattern is defin...
Chinar C. Shah, Xingquan Zhu, Taghi M. Khoshgoftaa...
109
Voted
ICASSP
2010
IEEE
15 years 9 days ago
CBCD based on color features and landmark MDS-assisted distance estimation
Content-Based Copy Detection (CBCD) of digital videos is an important research field that aims at the identification of modified copies of an original clip, e.g., on the Intern...
Marzia Corvaglia, Fabrizio Guerrini, Riccardo Leon...
114
Voted
JCS
2010
121views more  JCS 2010»
15 years 6 days ago
Computational soundness of symbolic zero-knowledge proofs
raction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significa...
Michael Backes, Dominique Unruh
MTA
2010
116views more  MTA 2010»
15 years 5 days ago
Performing content-based retrieval of humans using gait biometrics
In order to analyse surveillance video, we need to efficiently explore large datasets containing videos of walking humans. At survei llance-image resolution, the human walk (their ...
Sina Samangooei, Mark S. Nixon
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 2 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan