BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
verif (87)
base (70)
use (67)
line (59)
off (31)

Stem signatur$ (all stems)

311 papers:

CASECASE-2015-JiaJCS #locality #named #using
SoundLoc: Accurate room-level indoor localization using acoustic signatures (RJ, MJ, ZC, CJS), pp. 186–193.
DACDAC-2015-FernandezJAQVC15a #manycore #off the shelf #resource management
Resource usage templates and signatures for COTS multicore processors (GF, JJ, JA, EQ, TV, FJC), p. 6.
STOCSTOC-2015-GorbunovVW #standard
Leveled Fully Homomorphic Signatures from Standard Lattices (SG, VV, DW), pp. 469–477.
ICALPICALP-v1-2015-FaonioNV
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation (AF, JBN, DV), pp. 456–468.
CSCWCSCW-2015-MaddockSASOM #behaviour #multi #online #using
Characterizing Online Rumoring Behavior Using Multi-Dimensional Signatures (JM, KS, HJAH, DES, MO, RMM), pp. 228–241.
ECIRECIR-2015-ChappellGZ #approximate #nearest neighbour #slicing
Approximate Nearest-Neighbour Search with Inverted Signature Slice Lists (TC, SG, GZ), pp. 147–158.
DACDAC-2014-OderPG
Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices (TO, TP, TG), p. 6.
DATEDATE-2014-AndradesRC #design #detection
Signature indexing of design layouts for hotspot detection (CA, MAR, CCC), pp. 1–6.
DATEDATE-2014-CaplanMMM #execution #reliability #trade-off
Trade-offs in execution signature compression for reliable processor systems (JC, MIM, PM, BHM), pp. 1–6.
DRRDRR-2014-LiPLD #analysis #online #verification
On-line signature verification method by Laplacian spectral analysis and dynamic time warping (CL, LP, CL, XD), p. ?–10.
FMFM-2014-WenMM #analysis #formal method #information management #towards
Towards a Formal Analysis of Information Leakage for Signature Attacks in Preferential Elections (RW, AM, CM), pp. 595–610.
HCIHCI-AIMT-2014-RoshandelMMTK #3d #authentication #multi
Multi-sensor Finger Ring for Authentication Based on 3D Signatures (MR, AM, PM, ST, HK), pp. 131–138.
CIKMCIKM-2014-UysalBSS #approximate #database #distance #multi #performance #scalability #using
Efficient Filter Approximation Using the Earth Mover’s Distance in Very Large Multimedia Databases with Feature Signatures (MSU, CB, JS, TS), pp. 979–988.
ICPRICPR-2014-BekhetA #using #video
Compact Signature-Based Compressed Video Matching Using Dominant Color Profiles (DCP) (SB, AA), pp. 3933–3938.
ICPRICPR-2014-DuDA #modelling #topic #using
Signature Matching Using Supervised Topic Models (XD, DSD, WAA), pp. 327–332.
ICPRICPR-2014-OzkanEA #detection #video #visual notation
Visual Group Binary Signature for Video Copy Detection (, EE, GBA), pp. 3945–3950.
ICPRICPR-2014-SavakisRP #difference #gesture #learning #using
Gesture Control Using Active Difference Signatures and Sparse Learning (AES, RR, RWP), pp. 3969–3974.
ICPRICPR-2014-Wilson #graph #modelling #network
Graph Signatures for Evaluating Network Models (RCW), pp. 100–105.
MODELSMoDELS-2014-OgunyomiRK #incremental #model-to-text #on the
On the Use of Signatures for Source Incremental Model-to-text Transformation (BO, LMR, DSK), pp. 84–98.
MODELSMoDELS-2014-OgunyomiRK #incremental #model-to-text #on the
On the Use of Signatures for Source Incremental Model-to-text Transformation (BO, LMR, DSK), pp. 84–98.
PADLPADL-2014-WinantDPS #haskell
Partial Type Signatures for Haskell (TW, DD, FP, TS), pp. 17–32.
SACSAC-2014-ZandVYK #detection
Extracting probable command and control signatures for detecting botnets (AZ, GV, XY, CK), pp. 1657–1662.
CGOCGO-2014-KashyapH #security
Security Signature Inference for JavaScript-based Browser Addons (VK, BH), p. 219.
ICSTICST-2014-AydinAB #automation #generative #testing
Automated Test Generation from Vulnerability Signatures (AA, MA, TB), pp. 193–202.
ISSTAISSTA-2014-ZuoKS #debugging #mining #performance
Efficient predicated bug signature mining via hierarchical instrumentation (ZZ, SCK, CS), pp. 215–224.
DACDAC-2013-ZhangLSSR #automation #clustering
Automatic clustering of wafer spatial signatures (WZ, XL, SS, AJS, RAR), p. 6.
DATEDATE-2013-LiuN #multi
Radar signature in multiple target tracking system for driver assistant application (HL, SN), pp. 887–892.
ICDARICDAR-2013-DuAD #multi #scalability #using
Large-Scale Signature Matching Using Multi-stage Hashing (XD, WAA, DSD), pp. 976–980.
ICDARICDAR-2013-GriechischML #analysis #online
Online Signature Analysis Based on Accelerometric and Gyroscopic Pens and Legendre Series (EG, MIM, ML), pp. 374–378.
ICDARICDAR-2013-HuC #classification #pseudo #using #verification
Offline Signature Verification Using Real Adaboost Classifier Combination of Pseudo-dynamic Features (JH, YC), pp. 1345–1349.
ICDARICDAR-2013-KamihiraOWK #verification
Improvement of Japanese Signature Verification by Segmentation-Verification (YK, WO, TW, FK), pp. 379–382.
ICDARICDAR-2013-KhanKS #identification #problem #question #verification
Can Signature Biometrics Address Both Identification and Verification Problems? (SHK, ZK, FS), pp. 981–985.
ICDARICDAR-2013-MalikALD #forensics #realtime #verification
FREAK for Real Time Forensic Signature Verification (MIM, SA, ML, AD), pp. 971–975.
ICDARICDAR-2013-MalikLAOBF #contest #identification #verification
ICDAR 2013 Competitions on Signature Verification and Writer Identification for On- and Offline Skilled Forgeries (SigWiComp 2013) (MIM, ML, LA, WO, MB, BF), pp. 1477–1483.
ICDARICDAR-2013-MalikLD #automation #comparison #forensics #verification
Part-Based Automatic System in Comparison to Human Experts for Forensic Signature Verification (MIM, ML, AD), pp. 872–876.
ICDARICDAR-2013-ZhangT #documentation #kernel #keyword
Segmentation-Free Keyword Spotting for Handwritten Documents Based on Heat Kernel Signature (XZ, CLT), pp. 827–831.
PASTEPASTE-2013-Lu #automation #mining
Automatically mining program build information via signature matching (CDL), pp. 25–32.
STOCSTOC-2013-CaiGW
A complete dichotomy rises from the capture of vanishing signatures: extended abstract (JYC, HG, TW), pp. 635–644.
ICALPICALP-v2-2013-ImNP #data type #parametricity #recursion
Contractive Signatures with Recursive Types, Type Parameters, and Abstract Types (HI, KN, SP), pp. 299–311.
HCIDUXU-NTE-2013-KulkarniW #energy #using
Classifying Energy-Related Events Using Electromagnetic Field Signatures (ASK, KCW), pp. 105–111.
SEKESEKE-2013-ZhangLK #debugging #on the #statistics
On the Use of Bug and Predicate Signatures for Statistical Debugging (YZ, EL, BK), pp. 249–299.
ESEC-FSEESEC-FSE-2013-SunK #debugging #mining
Mining succinct predicated bug signatures (CS, SCK), pp. 576–586.
ICSEICSE-2013-AlmorsyGI #analysis #architecture #automation #security #using
Automated software architecture security risk analysis using formalized signatures (MA, JG, ASI), pp. 662–671.
HPCAHPCA-2013-KayaalpSNPA #architecture #named #reuse
SCRAP: Architecture for signature-based protection from Code Reuse Attacks (MK, TS, JN, DP, NBAG), pp. 258–269.
LCTESLCTES-2013-KhudiaM #control flow #low cost #using
Low cost control flow protection using abstract control signatures (DSK, SAM), pp. 3–12.
ASEASE-2012-AlmorsyGI #analysis #automation #using
Supporting automated vulnerability analysis using formalized vulnerability signatures (MA, JG, ASI), pp. 100–109.
DRRDRR-2012-CoetzerSS #collaboration #human-computer #performance #verification
Efficient cost-sensitive human-machine collaboration for offline signature verification (JC, JPS, RS).
CIAACIAA-2012-AmarniL #kernel #sequence
Factor and Subsequence Kernels and Signatures of Rational Languages (AA, SL), pp. 313–320.
ICPRICPR-2012-AnoopMBBR #representation #set
Covariance profiles: A signature representation for object sets (AKA, AM, UDB, CB, KRR), pp. 2541–2544.
ICPRICPR-2012-AzizWH #using
Shape signature using the edge-based Laplacian (FA, RCW, ERH), pp. 1594–1597.
ICPRICPR-2012-KennardBS #2d #approach #detection #geometry #using #verification
Offline signature verification and forgery detection using a 2-D geometric warping approach (DJK, WAB, TWS), pp. 3733–3736.
ICPRICPR-2012-MarieLM #invariant #locality #recognition #visual notation
Invariant signatures for omnidirectional visual place recognition and robot localization in unknown environments (RM, OLI, EMM), pp. 2537–2540.
ICPRICPR-2012-OReillyP
Looking for the brain stroke signature (CO, RP), pp. 1811–1814.
ICPRICPR-2012-PollardSA #forensics #image
Print biometrics: Recovering forensic signatures from halftone images (SBP, SJS, GBA), pp. 1651–1654.
ICPRICPR-2012-ThakoorB #classification #video
Structural signatures for passenger vehicle classification in video (NT, BB), pp. 926–929.
SACSAC-2012-OyamaGCSK #detection
Detecting malware signatures in a thin hypervisor (YO, TTDG, YC, TS, KK), pp. 1807–1814.
CGOCGO-2012-VankaT #data flow #dependence #performance #profiling #using
Efficient and accurate data dependence profiling using software signatures (RV, JT), pp. 186–195.
ASEASE-2011-HillPV #code search #natural language #source code
Improving source code search with natural language phrasal representations of method signatures (EH, LLP, KVS), pp. 524–527.
DACDAC-2011-KungHSS #optimisation
Thermal signature: a simple yet accurate thermal index for floorplan optimization (JK, IH, SSS, YS), pp. 108–113.
ICDARICDAR-2011-GalballyFMP #analysis #quality
Quality Analysis of Dynamic Signature Based on the Sigma-Lognormal Model (JG, JFA, MMD, RP), pp. 633–637.
ICDARICDAR-2011-LiwickiMHCBSBF #contest #online #verification
Signature Verification Competition for Online and Offline Skilled Forgeries (SigComp2011) (ML, MIM, CEvdH, XC, CB, RS, MB, BF), pp. 1480–1484.
ICDARICDAR-2011-MandalRP #documentation #random #segmentation #using
Signature Segmentation from Machine Printed Documents Using Conditional Random Field (RM, PPR, UP), pp. 1170–1174.
ICDARICDAR-2011-NguyenB #2d #feature model #verification
An Application of the 2D Gaussian Filter for Enhancing Feature Extraction in Off-line Signature Verification (VN, MB), pp. 339–343.
ICDARICDAR-2011-ParodiGB #approach #feature model #invariant #verification
A Circular Grid-Based Rotation Invariant Feature Extraction Approach for Off-line Signature Verification (MP, JCG, AB), pp. 1289–1293.
ICDARICDAR-2011-WangWZ #graph #online #using #verification
On-line Signature Verification Using Segment-to-Segment Graph Matching (KW, YW, ZZ), pp. 804–808.
SIGMODSIGMOD-2011-QinWLXL #performance #query #similarity #symmetry
Efficient exact edit similarity query processing with the asymmetric signature scheme (JQ, WW, YL, CX, XL), pp. 1033–1044.
HCIDHM-2011-Ng #3d #design
Three-Dimensional Grading of Virtual Garment with Design Signature Curves (RN), pp. 328–336.
ICEISICEIS-v1-2011-RamirezC #fault #process #using
Fault Diagnosis of Batch Processes Release using PCA Contribution Plots as Fault Signatures (AWR, JCL), pp. 223–228.
CIKMCIKM-2011-GevaV #documentation #named
TOPSIG: topology preserving document signatures (SG, CMDV), pp. 333–338.
CIKMCIKM-2011-KrulisLBSS #architecture #distance #gpu #manycore #polynomial
Processing the signature quadratic form distance on many-core GPU architectures (MK, JL, CB, TS, TS), pp. 2373–2376.
CIKMCIKM-2011-LiCBZH #clustering #semantics
Facilitating pattern discovery for relation extraction with semantic-signature-based clustering (YL, VC, SB, HZ, HH), pp. 1415–1424.
SACSAC-2011-Muramatsu #algorithm #online #random #verification
Random forgery attacks against DTW-based online signature verification algorithm (DM), pp. 27–28.
CASECASE-2010-RodriguezBMRW #analysis #assembly #detection
Failure detection in assembly: Force signature analysis (AR, DB, MTM, GFR, JW), pp. 210–215.
DATEDATE-2010-GomezSBF
Analog circuit test based on a digital signature (AG, RS, LB, JF), pp. 1641–1644.
DRRDRR-2010-ChenL #on the #pseudo #security #usability
On the usability and security of pseudo-signatures (JC, DPL), pp. 1–10.
CSMRCSMR-2010-OlivetoKAG #approach
Numerical Signatures of Antipatterns: An Approach Based on B-Splines (RO, FK, GA, YGG), pp. 248–251.
ICEISICEIS-AIDSS-2010-BarbantanLP #recognition
A Hierarchical Handwritten Offline Signature Recognition System (IB, CL, RP), pp. 139–147.
ICEISICEIS-DISI-2010-AndreiRD #authentication #online
Solutions for Speeding-up On-line Dynamic Signature Authentication (VA, SMR, SD), pp. 121–126.
ICEISICEIS-J-2010-PotoleaBL #approach #recognition
A Hierarchical Approach for the Offline Handwritten Signature Recognition (RP, IB, CL), pp. 264–279.
ICPRICPR-2010-BatistaGS #difference #representation #verification
Applying Dissimilarity Representation to Off-Line Signature Verification (LB, EG, RS), pp. 1293–1297.
ICPRICPR-2010-BazzaniCPFM #identification #multi
Multiple-Shot Person Re-identification by HPE Signature (LB, MC, AP, MF, VM), pp. 1413–1416.
ICPRICPR-2010-DonoserRB #prototype #recognition
Shape Prototype Signatures for Action Recognition (MD, HR, HB), pp. 1796–1799.
ICPRICPR-2010-GrazziniS #image
Iterative Ramp Sharpening for Structure/Signature-Preserving Simplification of Images (JG, PS), pp. 4585–4588.
ICPRICPR-2010-IbrahimKKG #analysis #online #using #verification
On-Line Signature Verification Using 1-D Velocity-Based Directional Analysis (MTI, MJK, MAK, LG), pp. 3830–3833.
ICPRICPR-2010-KumarCCAPH #classification #complexity #using
Heart Murmur Classification Using Complexity Signatures (DK, PC, RC, MA, RPP, JH), pp. 2564–2567.
ICPRICPR-2010-LvBYD #using #verification #visual notation
Off-Line Signature Verification Using Graphical Model (HL, XB, WY, JD), pp. 3784–3788.
ICPRICPR-2010-MakiharaHY #how #question
How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values? (YM, MAH, YY), pp. 1208–1211.
ICPRICPR-2010-PatrauceanGC #identification #invariant #using
Bubble Tag Identification Using an Invariant — Under — Perspective Signature (VP, PG, JC), pp. 408–411.
ICPRICPR-2010-PuS #learning #probability #verification
Probabilistic Measure for Signature Verification Based on Bayesian Learning (DP, SNS), pp. 1188–1191.
KDDKDD-2010-SundaravaradanHSSVHR #biology #modelling
Extracting temporal signatures for comprehending systems biology models (NS, KSMTH, VS, DJS, JPCV, LSH, NR), pp. 453–462.
SACSAC-2010-LeeST #algorithm #database #incremental #performance
An incremental algorithm for efficient unique signature discoveries on DNA databases (HPL, TFS, CYT), pp. 1506–1510.
SACSAC-2010-ZeffererK #database
An electronic-signature based circular resolution database system (TZ, TK), pp. 1840–1845.
HPDCHPDC-2010-JabriM #using
Authorization within grid-computing using certificateless identity-based proxy signature (MAJ, SM), pp. 292–295.
CSLCSL-2010-SternagelT #dependence #proving #termination
Signature Extensions Preserve Termination — An Alternative Proof via Dependency Pairs (CS, RT), pp. 514–528.
ASEASE-2009-YuAB #analysis #generative #source code #string #using
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses (FY, MA, TB), pp. 605–609.
ICDARICDAR-2009-Alonso-FernandezFGGO #robust #verification
Robustness of Signature Verification Systems to Imitators with Increasing Skills (FAF, JF, AG, JG, JOG), pp. 728–732.
ICDARICDAR-2009-BatistaGS #approach #multi #verification
A Multi-Hypothesis Approach for Off-Line Signature Verification with HMMs (LB, EG, RS), pp. 1315–1319.
ICDARICDAR-2009-BlankersHFV #contest #verification
ICDAR 2009 Signature Verification Competition (VLB, CEvdH, KF, LV), pp. 1403–1407.
ICDARICDAR-2009-BonillaFGH #pseudo #verification
Offline Signature Verification Based on Pseudo-Cepstral Coefficients (JFVB, MAFB, CMTG, JBAH), pp. 126–130.
ICDARICDAR-2009-ChenLM #pseudo #towards
Toward Resisting Forgery Attacks via Pseudo-Signatures (JC, DPL, FM), pp. 51–55.
ICDARICDAR-2009-FairhurstA #predict #profiling
An Investigation of Predictive Profiling from Handwritten Signature Data (MCF, MCDCA), pp. 1305–1309.
ICDARICDAR-2009-GalballyFMO #evaluation #using #verification
Evaluation of Brute-force Attack to Dynamic Signature Verification Using Synthetic Samples (JG, JF, MMD, JOG), pp. 131–135.
ICDARICDAR-2009-GalballyFMO09a
Improving the Enrollment in Dynamic Signature Verfication with Synthetic Samples (JG, JF, MMD, JOG), pp. 1295–1299.
ICDARICDAR-2009-IbrahimKKAG #analysis #dependence #online #using #verification
On-Line Signature Verification: Directional Analysis of a Signature Using Weighted Relative Angle Partitions for Exploitation of Inter-Feature Dependencies (MTI, MJK, MAK, KSA, LG), pp. 41–45.
ICDARICDAR-2009-LuqmanBR #classification #graph #network #recognition #using
Graphic Symbol Recognition Using Graph Based Signature and Bayesian Network Classifier (MML, TB, JYR), pp. 1325–1329.
ICDARICDAR-2009-MuramatsuYM #authentication #online #using
Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition (DM, KY, TM), pp. 46–50.
ICDARICDAR-2009-NguyenBL #problem #verification
Global Features for the Off-Line Signature Verification Problem (VN, MB, GL), pp. 1300–1304.
ICDARICDAR-2009-PrakashG #geometry #verification
Geometric Centroids and their Relative Distances for Off-line Signature Verification (HNP, DSG), pp. 121–125.
ICSMEICSM-2009-DraganCM #using
Using method stereotype distribution as a signature descriptor for software systems (ND, MLC, JIM), pp. 567–570.
CIKMCIKM-2009-LuHM #algorithm #approximate #performance #using
Efficient algorithms for approximate member extraction using signature-based inverted lists (JL, JH, XM), pp. 315–324.
CIKMCIKM-2009-MouzaLRS #algebra #n-gram #named #string #using
AS-index: a structure for string search using n-grams and algebraic signatures (CdM, WL, PR, TJES), pp. 295–304.
KDIRKDIR-2009-LamB #categorisation #invariant #multi #using
Invariant Categorisation of Polygonal Objects using Multi-resolution Signatures (RL, JMHdB), pp. 168–173.
SACSAC-2009-ZaidiBC #network #protocol #testing
Network protocol interoperability testing based on contextual signatures and passive testing (FZ, EB, ARC), pp. 2–7.
HPCAHPCA-2009-ReddiGHWSB #predict #using
Voltage emergency prediction: Using signatures to reduce operating margins (VJR, MSG, GHH, GYW, MDS, DMB), pp. 18–29.
ISSTAISSTA-2009-ChengLZWY #debugging #graph #identification #mining #using
Identifying bug signatures using discriminative graph mining (HC, DL, YZ, XW, XY), pp. 141–152.
ASEASE-2008-HsuJO #agile #debugging #identification #named #process
Rapid: Identifying Bug Signatures to Support Debugging Activities (HYH, JAJ, AO), pp. 439–442.
CASECASE-2008-WangSF #automation #detection #difference #equation
Partial differential equation-based GPR signature discrimination for automatic detection of bridge deck delamination (ZWW, GGS, TF), pp. 431–435.
DACDAC-2008-Abdollahi
Signature based Boolean matching in the presence of don’t cares (AA), pp. 642–647.
VLDBVLDB-2008-KunduB #data type
Structural signatures for tree data structures (AK, EB), pp. 138–150.
ICALPICALP-C-2008-KurosawaF #composition
Universally Composable Undeniable Signature (KK, JF), pp. 524–535.
SOFTVISSOFTVIS-2008-Panas #visualisation
Signature visualization of software binaries (TP), pp. 185–188.
ICEISICEIS-HCI-2008-LailaAN #online
Applying Kansei Engineering to Determine Emotional Signature of Online Clothing Websites (NLMN, MLA, MN), pp. 142–147.
ICPRICPR-2008-IbrahimG #online #using #verification
On-line signature verification by using most discriminating points (MTI, LG), pp. 1–4.
ICPRICPR-2008-LiuW #online #verification
Template selection for on-line signature verification (NL, YW), pp. 1–4.
ICPRICPR-2008-MottlLSY #kernel #online #verification
Signature verification based on fusion of on-line and off-line kernels (VM, ML, VS, AY), pp. 1–4.
ICPRICPR-2008-PesarinCMDPT #automation #classification #statistics
A statistical signature for automatic dialogue classification (AP, MC, VM, CD, AP, AT), pp. 1–4.
ASPLOSASPLOS-2008-ShenZDLSZ #hardware #on the fly
Hardware counter driven on-the-fly request signatures (KS, MZ, SD, CL, CS, XZ), pp. 189–200.
ASPLOSASPLOS-2008-TuckACT #analysis #hardware #named #optimisation
SoftSig: software-exposed hardware signatures for code analysis and optimization (JT, WA, LC, JT), pp. 145–156.
ICDARICDAR-2007-AraujoCF #approach #online #verification
An Approach to Improve Accuracy Rate of On-line Signature Verification Systems of Different Sizes (RA, GDCC, ECBCF), pp. 332–336.
ICDARICDAR-2007-ChangS #online #verification
Modified Dynamic Time Warping for Stroke-Based On-line Signature Verification (WC, JS), pp. 724–728.
ICDARICDAR-2007-CoetzerS #verification
A Human-Centric Off-Line Signature Verification System (HC, RS), pp. 153–157.
ICDARICDAR-2007-FreireFMO #fuzzy #on the
On the Applicability of Off-Line Signatures to the Fuzzy Vault Construction (MRF, JFA, MMD, JOG), pp. 1173–1177.
ICDARICDAR-2007-LladosS #documentation #word
Indexing Historical Documents by Word Shape Signatures (JL, GS), pp. 362–366.
ICDARICDAR-2007-Martinez-DiazFFO #on the #verification
On The Effects of Sampling Rate and Interpolation in HMM-Based Dynamic Signature Verification (MMD, JFA, MRF, JOG), pp. 1113–1117.
ICDARICDAR-2007-NguyenBML #classification #using #verification
Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines (VN, MB, VM, GL), pp. 734–738.
ICDARICDAR-2007-RabasseGF #synthesis
A Method for the Synthesis of Dynamic Biometric Signature Data (CR, RMG, MCF), pp. 168–172.
ICDARICDAR-2007-VargasFTA #corpus
Off-line Handwritten Signature GPDS-960 Corpus (FV, MAF, CMT, JBA), pp. 764–768.
ICDARICDAR-2007-VargasFTA07a #image #performance #verification
Off-line Signature Verification System Performance against Image Acquisition Resolution (JFVB, MAFB, CMTG, JBA), pp. 834–838.
ICDARICDAR-2007-ZhangL #recognition
A New Vectorial Signature for Quick Symbol Indexing, Filtering and Recognition (WZ, WL), pp. 536–540.
VLDBVLDB-2007-LitwinMRS #algebra #performance #string #using
Fast nGram-Based String Search Over Data Encoded Using Algebraic Signatures (WL, RM, PR, TJES), pp. 207–218.
ICALPICALP-2007-BellareNN #strict
Unrestricted Aggregate Signatures (MB, CN, GN), pp. 411–422.
ICALPICALP-2007-ChandranGS #random
Ring Signatures of Sub-linear Size Without Random Oracles (NC, JG, AS), pp. 423–434.
EDOCEDOC-2007-SunithaAK #using
Controlled Delegation in e-cheques Using Proxy Signatures (NRS, BBA, PK), pp. 414–422.
SACSAC-2007-MuSZ
Compact sequential aggregate signatures (YM, WS, HZ), pp. 249–253.
SACSAC-2007-SantosBOJ #approach #documentation #forensics #verification
Off-line signature verification based on forensic questioned document examination approach (CRS, FB, LSO, EJRJ), pp. 637–638.
HPCAHPCA-2007-MeixnerS #detection #fault #online
Error Detection via Online Checking of Cache Coherence with Token Coherence Signatures (AM, DJS), pp. 145–156.
FATESTestCom-FATES-2007-SchmerlK #testing #towards
Towards Systematic Signature Testing (SS, HK), pp. 276–291.
DACDAC-2006-MochockiLCH #3d #estimation #mobile
Signature-based workload estimation for mobile 3D graphics (BM, KL, SC, XSH), pp. 592–597.
DACDAC-2006-Wang #detection #symmetry
Exploiting K-Distance Signature for Boolean Matching and G-Symmetry Detection (KHW), pp. 516–521.
DATEDATE-2006-Kundu #analysis #design
A design for failure analysis (DFFA) technique to ensure incorruptible signatures (SK), pp. 309–310.
DRRDRR-2006-ChenS #2d #recognition #verification
Combining one- and two-dimensional signal recognition approaches to off-line signature verification (SC, SNS).
ICSMEICSM-2006-KimW
Properties of Signature Change Patterns (SK, EJWJ), pp. 4–13.
ICALPICALP-v2-2006-Vergnaud #verification
New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures (DV), pp. 58–69.
ICPRICPR-v1-2006-BenjellounTM #detection #using
Vertebra Edge Detection Using Polar Signature (MB, HT, SM), pp. 476–479.
ICPRICPR-v1-2006-DjiouaOP #interactive #recognition #verification
An interactive trajectory synthesizer to study outlier patterns in handwriting recognition and signature verification (MD, CO, RP), pp. 1124–1127.
ICPRICPR-v2-2006-ChenS #graph #verification
A New Off-line Signature Verification Method based on Graph (SC, SNS), pp. 869–872.
ICPRICPR-v2-2006-KhanKKA #dependence #online #verification
On-Line Signature Verification by Exploiting Inter-Feature Dependencies (MKK, MAK, MAUK, IA), pp. 796–799.
ICPRICPR-v2-2006-MozaffarifF #online #recognition
One Dimensional Fractal Coder for Online Signature Recognition (SM, KF, FF), pp. 857–860.
ICPRICPR-v2-2006-QuanHXLL #analysis #online #verification
Spectrum Analysis Based onWindows with Variable Widths for Online Signature Verification (ZHQ, DSH, XLX, MRL, TML), pp. 1122–1125.
ICPRICPR-v4-2006-ArmandBM #verification
Off-line Signature Verification based on the Modified Direction Feature (SA, MB, VM), pp. 509–512.
SACSAC-2006-ChenSC #algorithm #evaluation #query
Tree inclusion algorithm, signatures and evaluation of path-oriented queries (YC, YS, YC), pp. 1020–1025.
DRRDRR-2005-ChenD #feature model #verification
Sequence-matching-based feature extraction with applications to signature verification (YC, XD), pp. 76–83.
ICDARICDAR-2005-ChenS #verification
Use of Exterior Contours and Shape Features in Off-line Signature Verification (SC, SNS), pp. 1280–1284.
ICDARICDAR-2005-NakaiKI #documentation #image #invariant #retrieval
Camera-Based Document Image Retrieval as Voting for Partial Signatures of Projective Invariants (TN, KK, MI), pp. 379–383.
ICDARICDAR-2005-RichiardiKD #feature model #online #verification
Local and Global Feature Selection for On-line Signature Verification (JR, HK, AD), pp. 625–629.
ICDARICDAR-2005-RussellHBHM #using #verification
Dynamic Signature Verification Using Discriminative Training (GFR, JH, AB, AH, DM), pp. 1260–1264.
ICDARICDAR-2005-WanW #modelling #online #statistics #verification
On-Line Signature Verification With Two-Stage Statistical Models (LW, BW), pp. 282–286.
MSRMSR-2005-KimWB #analysis
Analysis of signature change patterns (SK, EJWJ, JB), pp. 16–20.
ICALPICALP-2005-KiltzMPR
Append-Only Signatures (EK, AM, SP, BR), pp. 434–445.
ICALPICALP-2005-LipmaaWB #security #verification
Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction (HL, GW, FB), pp. 459–471.
ICALPICALP-2005-TrolinW
Hierarchical Group Signatures (MT, DW), pp. 446–458.
FMFM-2005-BasinKTW #architecture #verification
Verification of a Signature Architecture with HOL-Z (DAB, HK, KT, BW), pp. 269–285.
ICFPICFP-2005-RamseyFG
An expressive language of signatures (NR, KF, PG), pp. 27–40.
CIKMCIKM-2005-NarasimhaT #database #named #outsourcing
DSAC: integrity for outsourced databases with signature aggregation and chaining (MN, GT), pp. 235–236.
MLDMMLDM-2005-Sy #approach #detection
Signature-Based Approach for Intrusion Detection (BKS), pp. 526–536.
PPDPPPDP-2005-CortierRZ #encryption #protocol #verification
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures (VC, MR, EZ), pp. 12–22.
SACSAC-2005-LeeST #database #performance
Efficient discovery of unique signatures on whole-genome EST databases (HPL, TFS, YTT), pp. 100–104.
HPDCHPDC-2005-LuCSG #streaming #validation
A streaming validation model for SOAP digital signature (WL, KC, AS, DG), pp. 243–252.
TLCATLCA-2005-PowerT
Binding Signatures for Generic Contexts (JP, MT), pp. 308–323.
DATEDATE-v2-2004-LeiningerGM #configuration management
Diagnosis of Scan-Chains by Use of a Configurable Signature Register and Error-Correcting Code (AL, MG, PM), pp. 1302–1309.
DocEngDocEng-2004-BeheraLI #documentation #identification #image #visual notation
Visual signature based identification of Low-resolution document images (AB, DL, RI), pp. 178–187.
ICSMEICSM-2004-ZageZ #metric #visualisation
Module Metric Signature (MMS) Visualization (DZ, WZ), p. 512.
CIKMCIKM-2004-JingYKT #locality #performance #similarity #transaction
Localized signature table: fast similarity search on transaction data (QJ, RY, PK, AKHT), pp. 314–323.
ICPRICPR-v1-2004-Li #authentication
Handwriting Authentication by Envelopes of Sound Signatures (FFL), pp. 401–404.
ICPRICPR-v2-2004-Hammoud #visual notation
Color Texture Signatures for Art-Paintings vs. Scene-Photographs Based on Human Visual System (RIH), pp. 525–528.
ICPRICPR-v2-2004-PranckevicieneBS #classification #identification
Consensus-Based Identification of Spectral Signatures for Classification of High-Dimensional Biomedical Spectra (EP, RB, RLS), pp. 319–322.
ICPRICPR-v2-2004-SchimkeVD #adaptation #authentication #distance #online #using
Using Adapted Levenshtein Distance for On-Line Signature Authentication (SS, CV, JD), pp. 931–934.
ICPRICPR-v3-2004-TamLN #geometry
Deformable Geometry Model Matching by Topological and Geometric Signatures (GKLT, RWHL, CWN), pp. 910–913.
KDDKDD-2004-KolczCA #detection #robust
Improved robustness of signature-based near-replica detection via lexicon randomization (AK, AC, JA), pp. 605–610.
SACSAC-2004-BamasakZ #mobile
A secure method for signature delegation to mobile agents (OB, NZ), pp. 813–818.
SACSAC-2004-ChenC #database #graph #object-oriented
Signature file hierarchies and signature graphs: a new index method for object-oriented databases (YC, YC), pp. 724–728.
SACSAC-2004-HeZ
A new signature scheme: joint-signature (LSH, NZ), pp. 807–812.
SACSAC-2004-MatsushitaKI #distributed #peer-to-peer #using
Feature-based distributed object search using signatures in Peer-to-Peer environments (RM, HK, YI), pp. 729–734.
HPCAHPCA-2004-PengPL #performance
Signature Buffer: Bridging Performance Gap between Registers and Caches (LP, JKP, KL), pp. 164–175.
ASEASE-2003-LicataHK #evolution #source code
The Feature Signatures of Evolving Programs (DRL, CDH, SK), pp. 281–285.
DATEDATE-2003-LupeaPJ #analysis #named
RF-BIST: Loopback Spectral Signature Analysis (DL, UP, HJJ), pp. 10478–10483.
ICDARICDAR-2003-BovinoIPS #multi #verification
Multi-Expert Verification of Hand-Written Signatures (LB, SI, GP, LS), pp. 932–936.
ICDARICDAR-2003-MuramatsuM #online #verification
An HMM On-line Signature Verifier Incorporating Signature Trajectories (DM, TM), pp. 438–442.
ICDARICDAR-2003-ShafieiR #algorithm #markov #modelling #online #segmentation #using #verification
A New On-Line Signature Verification Algorithm Using Variable Length Segmentation and Hidden Markov Models (MMS, HRR), p. 443–?.
ICDARICDAR-2003-Ueda #pattern matching #using #verification
Investigation of Off-Line Japanese Signature Verification Using a Pattern Matching (KU), p. 951–?.
ICDARICDAR-2003-ZimmerL #hybrid #verification
A Hybrid On/Off Line Handwritten Signature Verification System (AZ, LLL), pp. 424–428.
ICDARICDAR-2003-ZouTLL #analysis #online #using #verification
On-line Signature Verification Using Local Shape Analysis (MZ, JT, CL, ZL), pp. 314–318.
ICSMEICSM-2003-LimpiyakornB #comprehension #concept
Applying the Signature Concept to Plan-Based Program Understanding (YL, IB), p. 325–?.
STOCSTOC-2003-GennaroGK #bound #encryption #performance
Lower bounds on the efficiency of encryption and digital signature schemes (RG, YG, JK), pp. 417–425.
ICEISICEIS-v1-2003-HoBE #approach #database #performance #xml
Efficient Storage for XML Databases: Vertical View Model with Signature-Based Approach (WH, LB, DE), pp. 55–62.
CIKMCIKM-2003-ConradGS #detection #documentation #online #reliability #retrieval
Online duplicate document detection: signature reliability in a dynamic retrieval environment (JGC, XSG, CPS), pp. 443–452.
SEKESEKE-2003-LimpiyakornB #comprehension #knowledge-based
Integrating Signature Matching into Knowledge-Based Program Understanding (YL, IB), pp. 440–444.
DATEDATE-2002-VoorakaranamCC #agile #framework #testing
A Signature Test Framework for Rapid Production Testing of RF Circuits (RV, SC, AC), pp. 186–191.
ICPRICPR-v1-2002-SunCM #gesture #realtime #recognition
Real-Time Gesture Recognition System Based on Contour Signatures (XS, CWC, BSM), pp. 447–450.
ICPRICPR-v1-2002-VielhauerSM #online #statistics
Biometric Hash based on Statistical Features of Online Signatures (CV, RS, AM), pp. 123–126.
ICPRICPR-v3-2002-LauYT #estimation #sequence
Stroke Extraction and Stroke Sequence Estimation on Signatures (KKL, PCY, YYT), pp. 119–122.
ICPRICPR-v3-2002-StevensSP #identification #using
Identifying Vehicles Using Vibrometry Signatures (MRS, MS, DP), pp. 253–256.
ICPRICPR-v3-2002-Vasilescu #analysis #recognition #synthesis
Human Motion Signatures: Analysis, Synthesis, Recognition (MAOV), pp. 456–460.
SIGIRSIGIR-2002-ParkPGK #analysis #documentation
Analysis of lexical signatures for finding lost or related documents (STP, DMP, CLG, RK), pp. 11–18.
SACSAC-2002-FerreiraD #embedded #mobile
Blinded-key signatures: securing private keys embedded in mobile agents (LCF, RD), pp. 82–86.
SACSAC-2002-NascimentoC #image #retrieval #using
Color-based image retrieval using binary signatures (MAN, VC), pp. 687–692.
DATEDATE-2001-BayraktarogluO
Diagnosis for scan-based BIST: reaching deep into the signatures (IB, AO), pp. 102–111.
ICDARICDAR-2001-HanmandluMCG #fuzzy #modelling #verification
Fuzzy Modeling Based Signature Verification System (MH, KRMM, SC, GGI), pp. 110–115.
ICDARICDAR-2001-JustinoBS #random #using #verification
Off-line Signature Verification Using HMM for Random, Simple and Skilled Forgeries (EJRJ, FB, RS), pp. 1031–1034.
ICDARICDAR-2001-LejtmanG #network #online #using #verification
On-line Handwritten Signature Verification Using Wavelets and Back-propagation Neural Networks (DZL, SEG), pp. 992–996.
ICDARICDAR-2001-RheeCK #feature model #online #segmentation #using #verification
On-Line Signature Verification Using Model-Guided Segmentation and Discriminative Feature Selection for Skilled Forgeries (THR, SJC, JHK), pp. 645–649.
ICDARICDAR-2001-TabboneWT
Indexing of Technical Line Drawings Based on F-Signatures (ST, LW, KT), pp. 1220–1224.
ICDARICDAR-2001-TanabeYKMOI #automation #verification
Automatic Signature Verification Based on the Dynamic Feature of Pressure (KT, MY, HK, SM, SO, TI), pp. 1045–1049.
ICDARICDAR-2001-VielhauerSM #transitive #verification
Transitivity Based Enrollment Strategy for Signature Verification (CV, RS, AM), p. 1263–?.
ICALPICALP-2001-SchroderMT
Amalgamation in CASL via Enriched Signatures (LS, TM, AT), pp. 993–1004.
DACDAC-2000-ChaudhryBPE #analysis
Current signature compression for IR-drop analysis (RC, DB, RP, TE), pp. 162–167.
ICPRICPR-v2-2000-HuangY #using #verification
Signature Verification using Fractal Transformation (KH, HY), pp. 2851–2854.
ICPRICPR-v2-2000-RibaCVJ #classification #invariant
Methods for Invariant Signature Classification (JRR, AC, SV, IJ), pp. 2953–2956.
ICPRICPR-v3-2000-KoubaroulisMK #multimodal #performance
The Multimodal Signature Method: An Efficiency and Sensitivity Study (DK, JM, JK), pp. 3379–3382.
ICPRICPR-v4-2000-HatteryCLG #embedded #migration
Optical Signatures of Small, Deeply Embedded, Tumor-Like Inclusions in Tissue-Like Turbid Media Based on a Random-Walk Theory of Photon Migration (DH, VC, MHL, AG), pp. 4348–4351.
ICPRICPR-v4-2000-OhishiKM #online #using #verification
On-Line Signature Verification Using Pen-Position, Pen-Pressure and Pen-Inclination Trajectories (TO, YK, TM), pp. 4547–4550.
ICPRICPR-v4-2000-YamanyF #3d #recognition #using
3D Objects Coding and Recognition Using Surface Signatures (SMY, AAF), pp. 4571–4574.
KDDKDD-2000-CortesFPR #data type #named
Hancock: a language for extracting signatures from data streams (CC, KF, DP, AR), pp. 9–17.
DATEDATE-1999-NovakHK #analysis #on the
On Analog Signature Analysis (FN, BH, SK), p. 249–?.
DATEDATE-1999-RayaneVN #detection #embedded
A One-Bit-Signature BIST for Embedded Operational Amplifiers in Mixed-Signal Circuits Based on the Slew-Rate Detection (IR, JVM, MN), p. 792–?.
ICDARICDAR-1999-CordellaFSV #approach #documentation #multi #validation
Document Validation by Signature: A Serial Multi-Expert Approach (LPC, PF, CS, MV), pp. 601–604.
ICDARICDAR-1999-FangWLTKTW #approach #verification
A Smoothness Index based Approach for Off-line Signature Verification (BF, YYW, CHL, YYT, PCKK, KWT, YKW), pp. 785–787.
ICDARICDAR-1999-Hobby #classification #composition #geometry #layout
Page Decomposition and Signature Finding via Shape Classification and Geometric Layout (JDH), pp. 555–558.
ICDARICDAR-1999-LecceDGIPSS #automation #verification
Selection of Reference Signatures for Automatic Signature Verification (VDL, GD, AG, SI, GP, AS, LS), pp. 597–600.
ICDARICDAR-1999-MizukamiMYY #using #verification
An Off-line Signature Verification System using an Extraction Displacement Function (YM, HM, MY, IY), pp. 757–760.
PASTEPASTE-1999-Preston #fortran #legacy
New Type Signatures for Legacy Fortran Subroutines (NWP), pp. 76–85.
ICFPICFP-1999-Shao
Transparent Modules with Fully Syntactic Signatures (ZS), pp. 220–232.
ICEISICEIS-1999-FanCY
Blind Signatures with Double-Hashes Messages for Fair Electronic Elections and Ownership Claimable Digital Cash (CIF, WKC, YSY), pp. 612–618.
SACSAC-1999-KocberberC #information retrieval #multi #performance
Compressed Multi-Framed Signature Files: An Index Structure for Fast Information Retrieval (SK, FC), pp. 221–226.
DATEDATE-1998-GhoshKBH #benchmark #equivalence #invariant #metric #synthesis
Synthesis of Wiring Signature-Invariant Equivalence Class Circuit Mutants and Applications to Benchmarking (DG, NK, FB, JEHI), pp. 656–663.
ICPRICPR-1998-BouletreauVSE #identifier #question
Handwriting and signature: one or two personality identifiers? (VB, NV, RS, HE), pp. 1758–1760.
ICPRICPR-1998-ChenHS #analysis #email
E-mail signature block analysis (HC, JH, RS), pp. 1153–1156.
ICPRICPR-1998-DolfingAO #markov #modelling #online #verification
On-line signature verification with hidden Markov models (JGAD, EHLA, JJGMVO), pp. 1309–1312.
ICPRICPR-1998-RigollK #comparison #markov #modelling #online #verification
A systematic comparison between on-line and off-line methods for signature verification with hidden Markov models (GR, AK), pp. 1755–1757.
ICPRICPR-1998-ZhangFY98a #verification
Handwritten signature verification based on neural “gas” based vector quantization (BZ, MF, HY), pp. 1862–1864.
DATEEDTC-1997-AbdullaRK #embedded #multi
A scheme for multiple on-chip signature checking for embedded SRAMs (MFA, CPR, AK), p. 625.
ICDARICDAR-1997-KashiHNT #markov #online #using #verification
On-line Handwritten Signature Verification using Hidden Markov Model Features (RSK, JH, WLN, WT), pp. 253–257.
ICDARICDAR-1997-MartensC #online #optimisation #programming
Dynamic Programming Optimisation for On-line Signature Verificatio (RM, LJMC), pp. 653–656.
ICDARICDAR-1997-MartensC97a #online #verification
On-line Signature Verification: Discrimination Emphasised (RM, LJMC), pp. 657–660.
ICDARICDAR-1997-SabourinDW #matrix #verification
Shape Matrices as a Mixed Shape Factor for Off-line Signature Verification (RS, JPD, ESW), pp. 661–666.
ICDARICDAR-1997-SchmidtK #automation #personalisation #verification
Establishment of Personalized Templates for Automatic Signature Verification (CS, KFK), pp. 263–267.
ICDARICDAR-1997-Wirtz #prototype #verification
Average prototypes for stroke-based signature verification (BW), pp. 268–272.
VLDBVLDB-1997-ChakrabartiDAR #database #navigation #taxonomy #using
Using Taxonomy, Discriminants, and Signatures for Navigating in Text Databases (SC, BD, RA, PR), pp. 446–455.
CIKMCIKM-1996-ShinKC #named #performance #query
S-signature: A New Scheme for Efficient Query Processing of Complex Objects in OODB (HS, KK, JWC), pp. 207–214.
ICPRICPR-1996-Ben-ArieWR #invariant #recognition
Iconic recognition with affine-invariant spectral signatures (JBA, ZW, KRR), pp. 672–676.
ICPRICPR-1996-Kimmel #difference #image
Affine differential signatures for gray level images of planar shapes (RK), pp. 45–49.
ICPRICPR-1996-LeeL #verification
An off-line method for human signature verification (LLL, MGL), pp. 195–198.
ICPRICPR-1996-LeeL96a #image
A lossless image compression method for human static signatures (LLL, MGL), pp. 910–913.
ICPRICPR-1996-MartensC #online #verification
On-line signature verification by dynamic time-warping (RM, LJMC), pp. 38–42.
ICPRICPR-1996-SabourinGP #verification
Pattern spectrum as a local shape factor for off-line signature verification (RS, GG, FJP), pp. 43–48.
ICPRICPR-1996-TangLMLLS #approach #novel #recognition
A novel approach to optical character recognition based on ring-projection-wavelet-fractal signatures (YYT, BFL, HM, JL, CHL, CYS), pp. 325–329.
PPDPPLILP-1996-AponteC #morphism
Type Isomorphisms for Module Signatures (MVA, RDC), pp. 334–346.
POPLPOPL-1996-Jones #composition #using
Using Parameterized Signatures to Express Modular Structure (MPJ), pp. 68–78.
SACSAC-1996-HashemiSHL #identification #testing #using
Identifying and testing of signatures for non-volatile biomolecules using tandem mass spectra (RRH, TMS, WGH, JOL), pp. 44–49.
ICDARICDAR-v1-1995-BaeF #automation #parallel #verification
Parallelism in dynamic time warping for automatic signature verification (YJB, MCF), pp. 426–429.
ICDARICDAR-v1-1995-BauerW #automation #parametricity #personalisation #reduction #verification
Parameter reduction and personalized parameter selection for automatic signature verification (FB, BW), pp. 183–186.
ICDARICDAR-v1-1995-HanS #identification
Signature identification via local association of features (KH, IKS), pp. 187–190.
ICDARICDAR-v1-1995-LiangLY #query
False hits of tri-syllabic queries in a Chinese signature file (TL, SYL, WPY), pp. 159–162.
ICDARICDAR-v1-1995-MurshedBS #approach #verification
Off-line signature verification, without a priori knowledge of class /spl omega//sub 2/. A new approach (NAM, FB, RS), pp. 191–196.
ICDARICDAR-v1-1995-SabourinG #approach #classification #evaluation #multi #verification
An extended-shadow-code based approach for off-line signature verification. II. Evaluation of several multi-classifier combination strategies (RS, GG), pp. 197–201.
ICDARICDAR-v1-1995-Wirtz #verification
Stroke-based time warping for signature verification (BW), pp. 179–182.
ICDARICDAR-v1-1995-XiaoD #online #verification
A hierarchical on-line Chinese signature verification system (XHX, RWD), pp. 202–205.
ICDARICDAR-v2-1995-DrouhardSG #case study #classification #comparative #nearest neighbour #network #using #verification
Comparative study of the k nearest neighbour, threshold and neural network classifiers for handwritten signature verification using an enhanced directional PDF (JPD, RS, MG), pp. 807–810.
ICDARICDAR-v2-1995-KimPK #online #personalisation #set #verification
Applying personalized weights to a feature set for on-line signature verification (SHK, MSP, JK), pp. 882–885.
ICDARICDAR-v2-1995-Lee #verification
Neural approaches for human signature verification (LLL), pp. 1055–1058.
ICDARICDAR-v2-1995-TangMMLS #analysis #approach #documentation
A new approach to document analysis based on modified fractal signature (YYT, HM, XM, DL, CYS), pp. 567–570.
ICDARICDAR-v2-1995-Ueda #using
Extraction of signature and seal imprint from bankchecks by using color information (KU), pp. 665–668.
CIKMCIKM-1995-KimC #information retrieval #parallel #performance
A New Parallel Signature File Method for Efficient Information Retrieval (JKK, JWC), pp. 66–73.
POPLPOPL-1995-Biswas #higher-order
Higher-Order Functors with Transparent Signatures (SKB), pp. 154–163.
DATEEDAC-1994-Stroele #analysis
Signature Analysis for Sequential Circuits with Reset (APS), pp. 113–118.
LISPLFP-1994-BiagioniHLM #ml #network #protocol #stack #standard
Signatures for a Network Protocol Stack: A Systems Application of Standard ML (EB, RH, PL, BM), pp. 55–64.
DACDAC-1993-McGeerSBS #logic #named
Espresso-Signature: A New Exact Minimizer for Logic Functions (PCM, JVS, RKB, ALSV), pp. 618–624.
ICDARICDAR-1993-ChangWS #verification
Dynamic handwritten Chinese signature verification (HDC, JFW, HMS), pp. 258–261.
ICDARICDAR-1993-GazzoloB #identification #realtime #recognition
Real time signature recognition: A method for personal identification (GG, LB), pp. 707–709.
ICDARICDAR-1993-SabourinCG #approach #verification
An extended-shadow-code based approach for off-line signature verification (RS, MC, GG), pp. 1–5.
SIGMODSIGMOD-1993-Guting #higher-order #modelling #optimisation #query #specification
Second-Order Signature: A Tool for Specifying Data Models, Query Processing, and Optimization (RHG), pp. 277–286.
SIGMODSIGMOD-1993-IshikawaKO #evaluation #set
Evaluation of Signature Files as Set Access Facilities in OODBs (YI, HK, NO), pp. 247–256.
VLDBVLDB-1993-ZezulaCT #parallel
Hamming Filters: A Dynamic Signature File Organization for Parallel Stores (PZ, PC, PT), pp. 314–327.
SIGIRSIGIR-1993-AktugC #analysis #multi #query
Analysis of Multiterm Queries in a Dynamic Signature File Organization (DA, FC), pp. 96–105.
FSEFSE-1993-ZaremskiW #reuse
Signature Matching: A Key to Reuse (AMZ, JMW), pp. 182–190.
SIGIRSIGIR-1992-GrandiTZ #parallel
Frame-Sliced Partitioned Parallel Signature Files (FG, PT, PZ), pp. 286–297.
POPLPOPL-1992-Tofte #higher-order
Principal Signatures for Higher-Order Program Modules (MT), pp. 189–199.
SIGIRSIGIR-1991-Rabitti #image #multi #query
Image Query Processing Based on Multi-Level Signatures (FR, PS), pp. 305–314.
STOCSTOC-1990-Rompel
One-Way Functions are Necessary and Sufficient for Secure Signatures (JR), pp. 387–394.
SIGIRSIGIR-1990-RabittiZ #database #multi
A Dynamic Signature Technique for Multimedia Databases (FR, PZ), pp. 193–210.
SIGIRSIGIR-1990-Sacks-DavisW #analysis #documentation #retrieval #using
Using Syntactic Analysis in a Document Retrieval System that uses Signature Files (RSD, PW), pp. 179–192.
VLDBVLDB-1989-ChangS #database
A Signature Access Method for the Starburst Database System (WWC, HJS), pp. 145–153.
SIGIRSIGIR-1989-ChangLL #clustering #data access #multi
Multikey Access Methods Based on Term Discrimination and Signature Clustering (JWC, JHL, YJL), pp. 176–185.
DACDAC-1987-TanTBVP #performance #self #simulation
A Fast Signature Simulation Tool for Built-In Self-Testing Circuits (SBT, KT, KB, PV, RP), pp. 17–25.
SIGIRSIGIR-1986-Deppisch #named #retrieval
S-Tree: A Dynamic Balanced Signature Index for Office Retrieval (UD), pp. 77–87.
SIGMODSIGMOD-1985-Faloutsos #comparison #design #performance
Signature files: Design and Performance Comparison of Some Signature Extraction Methods (CF), pp. 63–82.
VLDBVLDB-1985-FaloutsosC #design #query
Design of a Signature File Method that Accounts for Non-Uniform Occurrence and Query Frequencies (CF, SC), pp. 165–170.
STOCSTOC-1984-OngSS #equation #performance #polynomial
An Efficient Signature Scheme Based on Quadratic Equations (HO, CPS, AS), pp. 208–216.
STOCSTOC-1983-GoldwasserMY
Strong Signature Schemes (SG, SM, ACCY), pp. 431–439.
STOCSTOC-1982-Carter #formal method #testing
The Theory of Signature Testing for VLSI (JLC), pp. 66–76.
ICALPICALP-1981-Lieberherr #complexity
Uniform Complexity and Digital Signatures (KJL), pp. 530–543.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.