311 papers:
- CASE-2015-JiaJCS #locality #named #using
- SoundLoc: Accurate room-level indoor localization using acoustic signatures (RJ, MJ, ZC, CJS), pp. 186–193.
- DAC-2015-FernandezJAQVC15a #manycore #off the shelf #resource management
- Resource usage templates and signatures for COTS multicore processors (GF, JJ, JA, EQ, TV, FJC), p. 6.
- STOC-2015-GorbunovVW #standard
- Leveled Fully Homomorphic Signatures from Standard Lattices (SG, VV, DW), pp. 469–477.
- ICALP-v1-2015-FaonioNV
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation (AF, JBN, DV), pp. 456–468.
- CSCW-2015-MaddockSASOM #behaviour #multi #online #using
- Characterizing Online Rumoring Behavior Using Multi-Dimensional Signatures (JM, KS, HJAH, DES, MO, RMM), pp. 228–241.
- ECIR-2015-ChappellGZ #approximate #nearest neighbour #slicing
- Approximate Nearest-Neighbour Search with Inverted Signature Slice Lists (TC, SG, GZ), pp. 147–158.
- DAC-2014-OderPG
- Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices (TO, TP, TG), p. 6.
- DATE-2014-AndradesRC #design #detection
- Signature indexing of design layouts for hotspot detection (CA, MAR, CCC), pp. 1–6.
- DATE-2014-CaplanMMM #execution #reliability #trade-off
- Trade-offs in execution signature compression for reliable processor systems (JC, MIM, PM, BHM), pp. 1–6.
- DRR-2014-LiPLD #analysis #online #verification
- On-line signature verification method by Laplacian spectral analysis and dynamic time warping (CL, LP, CL, XD), p. ?–10.
- FM-2014-WenMM #analysis #formal method #information management #towards
- Towards a Formal Analysis of Information Leakage for Signature Attacks in Preferential Elections (RW, AM, CM), pp. 595–610.
- HCI-AIMT-2014-RoshandelMMTK #3d #authentication #multi
- Multi-sensor Finger Ring for Authentication Based on 3D Signatures (MR, AM, PM, ST, HK), pp. 131–138.
- CIKM-2014-UysalBSS #approximate #database #distance #multi #performance #scalability #using
- Efficient Filter Approximation Using the Earth Mover’s Distance in Very Large Multimedia Databases with Feature Signatures (MSU, CB, JS, TS), pp. 979–988.
- ICPR-2014-BekhetA #using #video
- Compact Signature-Based Compressed Video Matching Using Dominant Color Profiles (DCP) (SB, AA), pp. 3933–3938.
- ICPR-2014-DuDA #modelling #topic #using
- Signature Matching Using Supervised Topic Models (XD, DSD, WAA), pp. 327–332.
- ICPR-2014-OzkanEA #detection #video #visual notation
- Visual Group Binary Signature for Video Copy Detection (SÖ, EE, GBA), pp. 3945–3950.
- ICPR-2014-SavakisRP #difference #gesture #learning #using
- Gesture Control Using Active Difference Signatures and Sparse Learning (AES, RR, RWP), pp. 3969–3974.
- ICPR-2014-Wilson #graph #modelling #network
- Graph Signatures for Evaluating Network Models (RCW), pp. 100–105.
- MoDELS-2014-OgunyomiRK #incremental #model-to-text #on the
- On the Use of Signatures for Source Incremental Model-to-text Transformation (BO, LMR, DSK), pp. 84–98.
- MoDELS-2014-OgunyomiRK #incremental #model-to-text #on the
- On the Use of Signatures for Source Incremental Model-to-text Transformation (BO, LMR, DSK), pp. 84–98.
- PADL-2014-WinantDPS #haskell
- Partial Type Signatures for Haskell (TW, DD, FP, TS), pp. 17–32.
- SAC-2014-ZandVYK #detection
- Extracting probable command and control signatures for detecting botnets (AZ, GV, XY, CK), pp. 1657–1662.
- CGO-2014-KashyapH #security
- Security Signature Inference for JavaScript-based Browser Addons (VK, BH), p. 219.
- ICST-2014-AydinAB #automation #generative #testing
- Automated Test Generation from Vulnerability Signatures (AA, MA, TB), pp. 193–202.
- ISSTA-2014-ZuoKS #debugging #mining #performance
- Efficient predicated bug signature mining via hierarchical instrumentation (ZZ, SCK, CS), pp. 215–224.
- DAC-2013-ZhangLSSR #automation #clustering
- Automatic clustering of wafer spatial signatures (WZ, XL, SS, AJS, RAR), p. 6.
- DATE-2013-LiuN #multi
- Radar signature in multiple target tracking system for driver assistant application (HL, SN), pp. 887–892.
- ICDAR-2013-DuAD #multi #scalability #using
- Large-Scale Signature Matching Using Multi-stage Hashing (XD, WAA, DSD), pp. 976–980.
- ICDAR-2013-GriechischML #analysis #online
- Online Signature Analysis Based on Accelerometric and Gyroscopic Pens and Legendre Series (EG, MIM, ML), pp. 374–378.
- ICDAR-2013-HuC #classification #pseudo #using #verification
- Offline Signature Verification Using Real Adaboost Classifier Combination of Pseudo-dynamic Features (JH, YC), pp. 1345–1349.
- ICDAR-2013-KamihiraOWK #verification
- Improvement of Japanese Signature Verification by Segmentation-Verification (YK, WO, TW, FK), pp. 379–382.
- ICDAR-2013-KhanKS #identification #problem #question #verification
- Can Signature Biometrics Address Both Identification and Verification Problems? (SHK, ZK, FS), pp. 981–985.
- ICDAR-2013-MalikALD #forensics #realtime #verification
- FREAK for Real Time Forensic Signature Verification (MIM, SA, ML, AD), pp. 971–975.
- ICDAR-2013-MalikLAOBF #contest #identification #verification
- ICDAR 2013 Competitions on Signature Verification and Writer Identification for On- and Offline Skilled Forgeries (SigWiComp 2013) (MIM, ML, LA, WO, MB, BF), pp. 1477–1483.
- ICDAR-2013-MalikLD #automation #comparison #forensics #verification
- Part-Based Automatic System in Comparison to Human Experts for Forensic Signature Verification (MIM, ML, AD), pp. 872–876.
- ICDAR-2013-ZhangT #documentation #kernel #keyword
- Segmentation-Free Keyword Spotting for Handwritten Documents Based on Heat Kernel Signature (XZ, CLT), pp. 827–831.
- PASTE-2013-Lu #automation #mining
- Automatically mining program build information via signature matching (CDL), pp. 25–32.
- STOC-2013-CaiGW
- A complete dichotomy rises from the capture of vanishing signatures: extended abstract (JYC, HG, TW), pp. 635–644.
- ICALP-v2-2013-ImNP #data type #parametricity #recursion
- Contractive Signatures with Recursive Types, Type Parameters, and Abstract Types (HI, KN, SP), pp. 299–311.
- DUXU-NTE-2013-KulkarniW #energy #using
- Classifying Energy-Related Events Using Electromagnetic Field Signatures (ASK, KCW), pp. 105–111.
- SEKE-2013-ZhangLK #debugging #on the #statistics
- On the Use of Bug and Predicate Signatures for Statistical Debugging (YZ, EL, BK), pp. 249–299.
- ESEC-FSE-2013-SunK #debugging #mining
- Mining succinct predicated bug signatures (CS, SCK), pp. 576–586.
- ICSE-2013-AlmorsyGI #analysis #architecture #automation #security #using
- Automated software architecture security risk analysis using formalized signatures (MA, JG, ASI), pp. 662–671.
- HPCA-2013-KayaalpSNPA #architecture #named #reuse
- SCRAP: Architecture for signature-based protection from Code Reuse Attacks (MK, TS, JN, DP, NBAG), pp. 258–269.
- LCTES-2013-KhudiaM #control flow #low cost #using
- Low cost control flow protection using abstract control signatures (DSK, SAM), pp. 3–12.
- ASE-2012-AlmorsyGI #analysis #automation #using
- Supporting automated vulnerability analysis using formalized vulnerability signatures (MA, JG, ASI), pp. 100–109.
- DRR-2012-CoetzerSS #collaboration #human-computer #performance #verification
- Efficient cost-sensitive human-machine collaboration for offline signature verification (JC, JPS, RS).
- CIAA-2012-AmarniL #kernel #sequence
- Factor and Subsequence Kernels and Signatures of Rational Languages (AA, SL), pp. 313–320.
- ICPR-2012-AnoopMBBR #representation #set
- Covariance profiles: A signature representation for object sets (AKA, AM, UDB, CB, KRR), pp. 2541–2544.
- ICPR-2012-AzizWH #using
- Shape signature using the edge-based Laplacian (FA, RCW, ERH), pp. 1594–1597.
- ICPR-2012-KennardBS #2d #approach #detection #geometry #using #verification
- Offline signature verification and forgery detection using a 2-D geometric warping approach (DJK, WAB, TWS), pp. 3733–3736.
- ICPR-2012-MarieLM #invariant #locality #recognition #visual notation
- Invariant signatures for omnidirectional visual place recognition and robot localization in unknown environments (RM, OLI, EMM), pp. 2537–2540.
- ICPR-2012-OReillyP
- Looking for the brain stroke signature (CO, RP), pp. 1811–1814.
- ICPR-2012-PollardSA #forensics #image
- Print biometrics: Recovering forensic signatures from halftone images (SBP, SJS, GBA), pp. 1651–1654.
- ICPR-2012-ThakoorB #classification #video
- Structural signatures for passenger vehicle classification in video (NT, BB), pp. 926–929.
- SAC-2012-OyamaGCSK #detection
- Detecting malware signatures in a thin hypervisor (YO, TTDG, YC, TS, KK), pp. 1807–1814.
- CGO-2012-VankaT #data flow #dependence #performance #profiling #using
- Efficient and accurate data dependence profiling using software signatures (RV, JT), pp. 186–195.
- ASE-2011-HillPV #code search #natural language #source code
- Improving source code search with natural language phrasal representations of method signatures (EH, LLP, KVS), pp. 524–527.
- DAC-2011-KungHSS #optimisation
- Thermal signature: a simple yet accurate thermal index for floorplan optimization (JK, IH, SSS, YS), pp. 108–113.
- ICDAR-2011-GalballyFMP #analysis #quality
- Quality Analysis of Dynamic Signature Based on the Sigma-Lognormal Model (JG, JFA, MMD, RP), pp. 633–637.
- ICDAR-2011-LiwickiMHCBSBF #contest #online #verification
- Signature Verification Competition for Online and Offline Skilled Forgeries (SigComp2011) (ML, MIM, CEvdH, XC, CB, RS, MB, BF), pp. 1480–1484.
- ICDAR-2011-MandalRP #documentation #random #segmentation #using
- Signature Segmentation from Machine Printed Documents Using Conditional Random Field (RM, PPR, UP), pp. 1170–1174.
- ICDAR-2011-NguyenB #2d #feature model #verification
- An Application of the 2D Gaussian Filter for Enhancing Feature Extraction in Off-line Signature Verification (VN, MB), pp. 339–343.
- ICDAR-2011-ParodiGB #approach #feature model #invariant #verification
- A Circular Grid-Based Rotation Invariant Feature Extraction Approach for Off-line Signature Verification (MP, JCG, AB), pp. 1289–1293.
- ICDAR-2011-WangWZ #graph #online #using #verification
- On-line Signature Verification Using Segment-to-Segment Graph Matching (KW, YW, ZZ), pp. 804–808.
- SIGMOD-2011-QinWLXL #performance #query #similarity #symmetry
- Efficient exact edit similarity query processing with the asymmetric signature scheme (JQ, WW, YL, CX, XL), pp. 1033–1044.
- DHM-2011-Ng #3d #design
- Three-Dimensional Grading of Virtual Garment with Design Signature Curves (RN), pp. 328–336.
- ICEIS-v1-2011-RamirezC #fault #process #using
- Fault Diagnosis of Batch Processes Release using PCA Contribution Plots as Fault Signatures (AWR, JCL), pp. 223–228.
- CIKM-2011-GevaV #documentation #named
- TOPSIG: topology preserving document signatures (SG, CMDV), pp. 333–338.
- CIKM-2011-KrulisLBSS #architecture #distance #gpu #manycore #polynomial
- Processing the signature quadratic form distance on many-core GPU architectures (MK, JL, CB, TS, TS), pp. 2373–2376.
- CIKM-2011-LiCBZH #clustering #semantics
- Facilitating pattern discovery for relation extraction with semantic-signature-based clustering (YL, VC, SB, HZ, HH), pp. 1415–1424.
- SAC-2011-Muramatsu #algorithm #online #random #verification
- Random forgery attacks against DTW-based online signature verification algorithm (DM), pp. 27–28.
- CASE-2010-RodriguezBMRW #analysis #assembly #detection
- Failure detection in assembly: Force signature analysis (AR, DB, MTM, GFR, JW), pp. 210–215.
- DATE-2010-GomezSBF
- Analog circuit test based on a digital signature (AG, RS, LB, JF), pp. 1641–1644.
- DRR-2010-ChenL #on the #pseudo #security #usability
- On the usability and security of pseudo-signatures (JC, DPL), pp. 1–10.
- CSMR-2010-OlivetoKAG #approach
- Numerical Signatures of Antipatterns: An Approach Based on B-Splines (RO, FK, GA, YGG), pp. 248–251.
- ICEIS-AIDSS-2010-BarbantanLP #recognition
- A Hierarchical Handwritten Offline Signature Recognition System (IB, CL, RP), pp. 139–147.
- ICEIS-DISI-2010-AndreiRD #authentication #online
- Solutions for Speeding-up On-line Dynamic Signature Authentication (VA, SMR, SD), pp. 121–126.
- ICEIS-J-2010-PotoleaBL #approach #recognition
- A Hierarchical Approach for the Offline Handwritten Signature Recognition (RP, IB, CL), pp. 264–279.
- ICPR-2010-BatistaGS #difference #representation #verification
- Applying Dissimilarity Representation to Off-Line Signature Verification (LB, EG, RS), pp. 1293–1297.
- ICPR-2010-BazzaniCPFM #identification #multi
- Multiple-Shot Person Re-identification by HPE Signature (LB, MC, AP, MF, VM), pp. 1413–1416.
- ICPR-2010-DonoserRB #prototype #recognition
- Shape Prototype Signatures for Action Recognition (MD, HR, HB), pp. 1796–1799.
- ICPR-2010-GrazziniS #image
- Iterative Ramp Sharpening for Structure/Signature-Preserving Simplification of Images (JG, PS), pp. 4585–4588.
- ICPR-2010-IbrahimKKG #analysis #online #using #verification
- On-Line Signature Verification Using 1-D Velocity-Based Directional Analysis (MTI, MJK, MAK, LG), pp. 3830–3833.
- ICPR-2010-KumarCCAPH #classification #complexity #using
- Heart Murmur Classification Using Complexity Signatures (DK, PC, RC, MA, RPP, JH), pp. 2564–2567.
- ICPR-2010-LvBYD #using #verification #visual notation
- Off-Line Signature Verification Using Graphical Model (HL, XB, WY, JD), pp. 3784–3788.
- ICPR-2010-MakiharaHY #how #question
- How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values? (YM, MAH, YY), pp. 1208–1211.
- ICPR-2010-PatrauceanGC #identification #invariant #using
- Bubble Tag Identification Using an Invariant — Under — Perspective Signature (VP, PG, JC), pp. 408–411.
- ICPR-2010-PuS #learning #probability #verification
- Probabilistic Measure for Signature Verification Based on Bayesian Learning (DP, SNS), pp. 1188–1191.
- KDD-2010-SundaravaradanHSSVHR #biology #modelling
- Extracting temporal signatures for comprehending systems biology models (NS, KSMTH, VS, DJS, JPCV, LSH, NR), pp. 453–462.
- SAC-2010-LeeST #algorithm #database #incremental #performance
- An incremental algorithm for efficient unique signature discoveries on DNA databases (HPL, TFS, CYT), pp. 1506–1510.
- SAC-2010-ZeffererK #database
- An electronic-signature based circular resolution database system (TZ, TK), pp. 1840–1845.
- HPDC-2010-JabriM #using
- Authorization within grid-computing using certificateless identity-based proxy signature (MAJ, SM), pp. 292–295.
- CSL-2010-SternagelT #dependence #proving #termination
- Signature Extensions Preserve Termination — An Alternative Proof via Dependency Pairs (CS, RT), pp. 514–528.
- ASE-2009-YuAB #analysis #generative #source code #string #using
- Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses (FY, MA, TB), pp. 605–609.
- ICDAR-2009-Alonso-FernandezFGGO #robust #verification
- Robustness of Signature Verification Systems to Imitators with Increasing Skills (FAF, JF, AG, JG, JOG), pp. 728–732.
- ICDAR-2009-BatistaGS #approach #multi #verification
- A Multi-Hypothesis Approach for Off-Line Signature Verification with HMMs (LB, EG, RS), pp. 1315–1319.
- ICDAR-2009-BlankersHFV #contest #verification
- ICDAR 2009 Signature Verification Competition (VLB, CEvdH, KF, LV), pp. 1403–1407.
- ICDAR-2009-BonillaFGH #pseudo #verification
- Offline Signature Verification Based on Pseudo-Cepstral Coefficients (JFVB, MAFB, CMTG, JBAH), pp. 126–130.
- ICDAR-2009-ChenLM #pseudo #towards
- Toward Resisting Forgery Attacks via Pseudo-Signatures (JC, DPL, FM), pp. 51–55.
- ICDAR-2009-FairhurstA #predict #profiling
- An Investigation of Predictive Profiling from Handwritten Signature Data (MCF, MCDCA), pp. 1305–1309.
- ICDAR-2009-GalballyFMO #evaluation #using #verification
- Evaluation of Brute-force Attack to Dynamic Signature Verification Using Synthetic Samples (JG, JF, MMD, JOG), pp. 131–135.
- ICDAR-2009-GalballyFMO09a
- Improving the Enrollment in Dynamic Signature Verfication with Synthetic Samples (JG, JF, MMD, JOG), pp. 1295–1299.
- ICDAR-2009-IbrahimKKAG #analysis #dependence #online #using #verification
- On-Line Signature Verification: Directional Analysis of a Signature Using Weighted Relative Angle Partitions for Exploitation of Inter-Feature Dependencies (MTI, MJK, MAK, KSA, LG), pp. 41–45.
- ICDAR-2009-LuqmanBR #classification #graph #network #recognition #using
- Graphic Symbol Recognition Using Graph Based Signature and Bayesian Network Classifier (MML, TB, JYR), pp. 1325–1329.
- ICDAR-2009-MuramatsuYM #authentication #online #using
- Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition (DM, KY, TM), pp. 46–50.
- ICDAR-2009-NguyenBL #problem #verification
- Global Features for the Off-Line Signature Verification Problem (VN, MB, GL), pp. 1300–1304.
- ICDAR-2009-PrakashG #geometry #verification
- Geometric Centroids and their Relative Distances for Off-line Signature Verification (HNP, DSG), pp. 121–125.
- ICSM-2009-DraganCM #using
- Using method stereotype distribution as a signature descriptor for software systems (ND, MLC, JIM), pp. 567–570.
- CIKM-2009-LuHM #algorithm #approximate #performance #using
- Efficient algorithms for approximate member extraction using signature-based inverted lists (JL, JH, XM), pp. 315–324.
- CIKM-2009-MouzaLRS #algebra #n-gram #named #string #using
- AS-index: a structure for string search using n-grams and algebraic signatures (CdM, WL, PR, TJES), pp. 295–304.
- KDIR-2009-LamB #categorisation #invariant #multi #using
- Invariant Categorisation of Polygonal Objects using Multi-resolution Signatures (RL, JMHdB), pp. 168–173.
- SAC-2009-ZaidiBC #network #protocol #testing
- Network protocol interoperability testing based on contextual signatures and passive testing (FZ, EB, ARC), pp. 2–7.
- HPCA-2009-ReddiGHWSB #predict #using
- Voltage emergency prediction: Using signatures to reduce operating margins (VJR, MSG, GHH, GYW, MDS, DMB), pp. 18–29.
- ISSTA-2009-ChengLZWY #debugging #graph #identification #mining #using
- Identifying bug signatures using discriminative graph mining (HC, DL, YZ, XW, XY), pp. 141–152.
- ASE-2008-HsuJO #agile #debugging #identification #named #process
- Rapid: Identifying Bug Signatures to Support Debugging Activities (HYH, JAJ, AO), pp. 439–442.
- CASE-2008-WangSF #automation #detection #difference #equation
- Partial differential equation-based GPR signature discrimination for automatic detection of bridge deck delamination (ZWW, GGS, TF), pp. 431–435.
- DAC-2008-Abdollahi
- Signature based Boolean matching in the presence of don’t cares (AA), pp. 642–647.
- VLDB-2008-KunduB #data type
- Structural signatures for tree data structures (AK, EB), pp. 138–150.
- ICALP-C-2008-KurosawaF #composition
- Universally Composable Undeniable Signature (KK, JF), pp. 524–535.
- SOFTVIS-2008-Panas #visualisation
- Signature visualization of software binaries (TP), pp. 185–188.
- ICEIS-HCI-2008-LailaAN #online
- Applying Kansei Engineering to Determine Emotional Signature of Online Clothing Websites (NLMN, MLA, MN), pp. 142–147.
- ICPR-2008-IbrahimG #online #using #verification
- On-line signature verification by using most discriminating points (MTI, LG), pp. 1–4.
- ICPR-2008-LiuW #online #verification
- Template selection for on-line signature verification (NL, YW), pp. 1–4.
- ICPR-2008-MottlLSY #kernel #online #verification
- Signature verification based on fusion of on-line and off-line kernels (VM, ML, VS, AY), pp. 1–4.
- ICPR-2008-PesarinCMDPT #automation #classification #statistics
- A statistical signature for automatic dialogue classification (AP, MC, VM, CD, AP, AT), pp. 1–4.
- ASPLOS-2008-ShenZDLSZ #hardware #on the fly
- Hardware counter driven on-the-fly request signatures (KS, MZ, SD, CL, CS, XZ), pp. 189–200.
- ASPLOS-2008-TuckACT #analysis #hardware #named #optimisation
- SoftSig: software-exposed hardware signatures for code analysis and optimization (JT, WA, LC, JT), pp. 145–156.
- ICDAR-2007-AraujoCF #approach #online #verification
- An Approach to Improve Accuracy Rate of On-line Signature Verification Systems of Different Sizes (RA, GDCC, ECBCF), pp. 332–336.
- ICDAR-2007-ChangS #online #verification
- Modified Dynamic Time Warping for Stroke-Based On-line Signature Verification (WC, JS), pp. 724–728.
- ICDAR-2007-CoetzerS #verification
- A Human-Centric Off-Line Signature Verification System (HC, RS), pp. 153–157.
- ICDAR-2007-FreireFMO #fuzzy #on the
- On the Applicability of Off-Line Signatures to the Fuzzy Vault Construction (MRF, JFA, MMD, JOG), pp. 1173–1177.
- ICDAR-2007-LladosS #documentation #word
- Indexing Historical Documents by Word Shape Signatures (JL, GS), pp. 362–366.
- ICDAR-2007-Martinez-DiazFFO #on the #verification
- On The Effects of Sampling Rate and Interpolation in HMM-Based Dynamic Signature Verification (MMD, JFA, MRF, JOG), pp. 1113–1117.
- ICDAR-2007-NguyenBML #classification #using #verification
- Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines (VN, MB, VM, GL), pp. 734–738.
- ICDAR-2007-RabasseGF #synthesis
- A Method for the Synthesis of Dynamic Biometric Signature Data (CR, RMG, MCF), pp. 168–172.
- ICDAR-2007-VargasFTA #corpus
- Off-line Handwritten Signature GPDS-960 Corpus (FV, MAF, CMT, JBA), pp. 764–768.
- ICDAR-2007-VargasFTA07a #image #performance #verification
- Off-line Signature Verification System Performance against Image Acquisition Resolution (JFVB, MAFB, CMTG, JBA), pp. 834–838.
- ICDAR-2007-ZhangL #recognition
- A New Vectorial Signature for Quick Symbol Indexing, Filtering and Recognition (WZ, WL), pp. 536–540.
- VLDB-2007-LitwinMRS #algebra #performance #string #using
- Fast nGram-Based String Search Over Data Encoded Using Algebraic Signatures (WL, RM, PR, TJES), pp. 207–218.
- ICALP-2007-BellareNN #strict
- Unrestricted Aggregate Signatures (MB, CN, GN), pp. 411–422.
- ICALP-2007-ChandranGS #random
- Ring Signatures of Sub-linear Size Without Random Oracles (NC, JG, AS), pp. 423–434.
- EDOC-2007-SunithaAK #using
- Controlled Delegation in e-cheques Using Proxy Signatures (NRS, BBA, PK), pp. 414–422.
- SAC-2007-MuSZ
- Compact sequential aggregate signatures (YM, WS, HZ), pp. 249–253.
- SAC-2007-SantosBOJ #approach #documentation #forensics #verification
- Off-line signature verification based on forensic questioned document examination approach (CRS, FB, LSO, EJRJ), pp. 637–638.
- HPCA-2007-MeixnerS #detection #fault #online
- Error Detection via Online Checking of Cache Coherence with Token Coherence Signatures (AM, DJS), pp. 145–156.
- TestCom-FATES-2007-SchmerlK #testing #towards
- Towards Systematic Signature Testing (SS, HK), pp. 276–291.
- DAC-2006-MochockiLCH #3d #estimation #mobile
- Signature-based workload estimation for mobile 3D graphics (BM, KL, SC, XSH), pp. 592–597.
- DAC-2006-Wang #detection #symmetry
- Exploiting K-Distance Signature for Boolean Matching and G-Symmetry Detection (KHW), pp. 516–521.
- DATE-2006-Kundu #analysis #design
- A design for failure analysis (DFFA) technique to ensure incorruptible signatures (SK), pp. 309–310.
- DRR-2006-ChenS #2d #recognition #verification
- Combining one- and two-dimensional signal recognition approaches to off-line signature verification (SC, SNS).
- ICSM-2006-KimW
- Properties of Signature Change Patterns (SK, EJWJ), pp. 4–13.
- ICALP-v2-2006-Vergnaud #verification
- New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures (DV), pp. 58–69.
- ICPR-v1-2006-BenjellounTM #detection #using
- Vertebra Edge Detection Using Polar Signature (MB, HT, SM), pp. 476–479.
- ICPR-v1-2006-DjiouaOP #interactive #recognition #verification
- An interactive trajectory synthesizer to study outlier patterns in handwriting recognition and signature verification (MD, CO, RP), pp. 1124–1127.
- ICPR-v2-2006-ChenS #graph #verification
- A New Off-line Signature Verification Method based on Graph (SC, SNS), pp. 869–872.
- ICPR-v2-2006-KhanKKA #dependence #online #verification
- On-Line Signature Verification by Exploiting Inter-Feature Dependencies (MKK, MAK, MAUK, IA), pp. 796–799.
- ICPR-v2-2006-MozaffarifF #online #recognition
- One Dimensional Fractal Coder for Online Signature Recognition (SM, KF, FF), pp. 857–860.
- ICPR-v2-2006-QuanHXLL #analysis #online #verification
- Spectrum Analysis Based onWindows with Variable Widths for Online Signature Verification (ZHQ, DSH, XLX, MRL, TML), pp. 1122–1125.
- ICPR-v4-2006-ArmandBM #verification
- Off-line Signature Verification based on the Modified Direction Feature (SA, MB, VM), pp. 509–512.
- SAC-2006-ChenSC #algorithm #evaluation #query
- Tree inclusion algorithm, signatures and evaluation of path-oriented queries (YC, YS, YC), pp. 1020–1025.
- DRR-2005-ChenD #feature model #verification
- Sequence-matching-based feature extraction with applications to signature verification (YC, XD), pp. 76–83.
- ICDAR-2005-ChenS #verification
- Use of Exterior Contours and Shape Features in Off-line Signature Verification (SC, SNS), pp. 1280–1284.
- ICDAR-2005-NakaiKI #documentation #image #invariant #retrieval
- Camera-Based Document Image Retrieval as Voting for Partial Signatures of Projective Invariants (TN, KK, MI), pp. 379–383.
- ICDAR-2005-RichiardiKD #feature model #online #verification
- Local and Global Feature Selection for On-line Signature Verification (JR, HK, AD), pp. 625–629.
- ICDAR-2005-RussellHBHM #using #verification
- Dynamic Signature Verification Using Discriminative Training (GFR, JH, AB, AH, DM), pp. 1260–1264.
- ICDAR-2005-WanW #modelling #online #statistics #verification
- On-Line Signature Verification With Two-Stage Statistical Models (LW, BW), pp. 282–286.
- MSR-2005-KimWB #analysis
- Analysis of signature change patterns (SK, EJWJ, JB), pp. 16–20.
- ICALP-2005-KiltzMPR
- Append-Only Signatures (EK, AM, SP, BR), pp. 434–445.
- ICALP-2005-LipmaaWB #security #verification
- Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction (HL, GW, FB), pp. 459–471.
- ICALP-2005-TrolinW
- Hierarchical Group Signatures (MT, DW), pp. 446–458.
- FM-2005-BasinKTW #architecture #verification
- Verification of a Signature Architecture with HOL-Z (DAB, HK, KT, BW), pp. 269–285.
- ICFP-2005-RamseyFG
- An expressive language of signatures (NR, KF, PG), pp. 27–40.
- CIKM-2005-NarasimhaT #database #named #outsourcing
- DSAC: integrity for outsourced databases with signature aggregation and chaining (MN, GT), pp. 235–236.
- MLDM-2005-Sy #approach #detection
- Signature-Based Approach for Intrusion Detection (BKS), pp. 526–536.
- PPDP-2005-CortierRZ #encryption #protocol #verification
- A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures (VC, MR, EZ), pp. 12–22.
- SAC-2005-LeeST #database #performance
- Efficient discovery of unique signatures on whole-genome EST databases (HPL, TFS, YTT), pp. 100–104.
- HPDC-2005-LuCSG #streaming #validation
- A streaming validation model for SOAP digital signature (WL, KC, AS, DG), pp. 243–252.
- TLCA-2005-PowerT
- Binding Signatures for Generic Contexts (JP, MT), pp. 308–323.
- DATE-v2-2004-LeiningerGM #configuration management
- Diagnosis of Scan-Chains by Use of a Configurable Signature Register and Error-Correcting Code (AL, MG, PM), pp. 1302–1309.
- DocEng-2004-BeheraLI #documentation #identification #image #visual notation
- Visual signature based identification of Low-resolution document images (AB, DL, RI), pp. 178–187.
- ICSM-2004-ZageZ #metric #visualisation
- Module Metric Signature (MMS) Visualization (DZ, WZ), p. 512.
- CIKM-2004-JingYKT #locality #performance #similarity #transaction
- Localized signature table: fast similarity search on transaction data (QJ, RY, PK, AKHT), pp. 314–323.
- ICPR-v1-2004-Li #authentication
- Handwriting Authentication by Envelopes of Sound Signatures (FFL), pp. 401–404.
- ICPR-v2-2004-Hammoud #visual notation
- Color Texture Signatures for Art-Paintings vs. Scene-Photographs Based on Human Visual System (RIH), pp. 525–528.
- ICPR-v2-2004-PranckevicieneBS #classification #identification
- Consensus-Based Identification of Spectral Signatures for Classification of High-Dimensional Biomedical Spectra (EP, RB, RLS), pp. 319–322.
- ICPR-v2-2004-SchimkeVD #adaptation #authentication #distance #online #using
- Using Adapted Levenshtein Distance for On-Line Signature Authentication (SS, CV, JD), pp. 931–934.
- ICPR-v3-2004-TamLN #geometry
- Deformable Geometry Model Matching by Topological and Geometric Signatures (GKLT, RWHL, CWN), pp. 910–913.
- KDD-2004-KolczCA #detection #robust
- Improved robustness of signature-based near-replica detection via lexicon randomization (AK, AC, JA), pp. 605–610.
- SAC-2004-BamasakZ #mobile
- A secure method for signature delegation to mobile agents (OB, NZ), pp. 813–818.
- SAC-2004-ChenC #database #graph #object-oriented
- Signature file hierarchies and signature graphs: a new index method for object-oriented databases (YC, YC), pp. 724–728.
- SAC-2004-HeZ
- A new signature scheme: joint-signature (LSH, NZ), pp. 807–812.
- SAC-2004-MatsushitaKI #distributed #peer-to-peer #using
- Feature-based distributed object search using signatures in Peer-to-Peer environments (RM, HK, YI), pp. 729–734.
- HPCA-2004-PengPL #performance
- Signature Buffer: Bridging Performance Gap between Registers and Caches (LP, JKP, KL), pp. 164–175.
- ASE-2003-LicataHK #evolution #source code
- The Feature Signatures of Evolving Programs (DRL, CDH, SK), pp. 281–285.
- DATE-2003-LupeaPJ #analysis #named
- RF-BIST: Loopback Spectral Signature Analysis (DL, UP, HJJ), pp. 10478–10483.
- ICDAR-2003-BovinoIPS #multi #verification
- Multi-Expert Verification of Hand-Written Signatures (LB, SI, GP, LS), pp. 932–936.
- ICDAR-2003-MuramatsuM #online #verification
- An HMM On-line Signature Verifier Incorporating Signature Trajectories (DM, TM), pp. 438–442.
- ICDAR-2003-ShafieiR #algorithm #markov #modelling #online #segmentation #using #verification
- A New On-Line Signature Verification Algorithm Using Variable Length Segmentation and Hidden Markov Models (MMS, HRR), p. 443–?.
- ICDAR-2003-Ueda #pattern matching #using #verification
- Investigation of Off-Line Japanese Signature Verification Using a Pattern Matching (KU), p. 951–?.
- ICDAR-2003-ZimmerL #hybrid #verification
- A Hybrid On/Off Line Handwritten Signature Verification System (AZ, LLL), pp. 424–428.
- ICDAR-2003-ZouTLL #analysis #online #using #verification
- On-line Signature Verification Using Local Shape Analysis (MZ, JT, CL, ZL), pp. 314–318.
- ICSM-2003-LimpiyakornB #comprehension #concept
- Applying the Signature Concept to Plan-Based Program Understanding (YL, IB), p. 325–?.
- STOC-2003-GennaroGK #bound #encryption #performance
- Lower bounds on the efficiency of encryption and digital signature schemes (RG, YG, JK), pp. 417–425.
- ICEIS-v1-2003-HoBE #approach #database #performance #xml
- Efficient Storage for XML Databases: Vertical View Model with Signature-Based Approach (WH, LB, DE), pp. 55–62.
- CIKM-2003-ConradGS #detection #documentation #online #reliability #retrieval
- Online duplicate document detection: signature reliability in a dynamic retrieval environment (JGC, XSG, CPS), pp. 443–452.
- SEKE-2003-LimpiyakornB #comprehension #knowledge-based
- Integrating Signature Matching into Knowledge-Based Program Understanding (YL, IB), pp. 440–444.
- DATE-2002-VoorakaranamCC #agile #framework #testing
- A Signature Test Framework for Rapid Production Testing of RF Circuits (RV, SC, AC), pp. 186–191.
- ICPR-v1-2002-SunCM #gesture #realtime #recognition
- Real-Time Gesture Recognition System Based on Contour Signatures (XS, CWC, BSM), pp. 447–450.
- ICPR-v1-2002-VielhauerSM #online #statistics
- Biometric Hash based on Statistical Features of Online Signatures (CV, RS, AM), pp. 123–126.
- ICPR-v3-2002-LauYT #estimation #sequence
- Stroke Extraction and Stroke Sequence Estimation on Signatures (KKL, PCY, YYT), pp. 119–122.
- ICPR-v3-2002-StevensSP #identification #using
- Identifying Vehicles Using Vibrometry Signatures (MRS, MS, DP), pp. 253–256.
- ICPR-v3-2002-Vasilescu #analysis #recognition #synthesis
- Human Motion Signatures: Analysis, Synthesis, Recognition (MAOV), pp. 456–460.
- SIGIR-2002-ParkPGK #analysis #documentation
- Analysis of lexical signatures for finding lost or related documents (STP, DMP, CLG, RK), pp. 11–18.
- SAC-2002-FerreiraD #embedded #mobile
- Blinded-key signatures: securing private keys embedded in mobile agents (LCF, RD), pp. 82–86.
- SAC-2002-NascimentoC #image #retrieval #using
- Color-based image retrieval using binary signatures (MAN, VC), pp. 687–692.
- DATE-2001-BayraktarogluO
- Diagnosis for scan-based BIST: reaching deep into the signatures (IB, AO), pp. 102–111.
- ICDAR-2001-HanmandluMCG #fuzzy #modelling #verification
- Fuzzy Modeling Based Signature Verification System (MH, KRMM, SC, GGI), pp. 110–115.
- ICDAR-2001-JustinoBS #random #using #verification
- Off-line Signature Verification Using HMM for Random, Simple and Skilled Forgeries (EJRJ, FB, RS), pp. 1031–1034.
- ICDAR-2001-LejtmanG #network #online #using #verification
- On-line Handwritten Signature Verification Using Wavelets and Back-propagation Neural Networks (DZL, SEG), pp. 992–996.
- ICDAR-2001-RheeCK #feature model #online #segmentation #using #verification
- On-Line Signature Verification Using Model-Guided Segmentation and Discriminative Feature Selection for Skilled Forgeries (THR, SJC, JHK), pp. 645–649.
- ICDAR-2001-TabboneWT
- Indexing of Technical Line Drawings Based on F-Signatures (ST, LW, KT), pp. 1220–1224.
- ICDAR-2001-TanabeYKMOI #automation #verification
- Automatic Signature Verification Based on the Dynamic Feature of Pressure (KT, MY, HK, SM, SO, TI), pp. 1045–1049.
- ICDAR-2001-VielhauerSM #transitive #verification
- Transitivity Based Enrollment Strategy for Signature Verification (CV, RS, AM), p. 1263–?.
- ICALP-2001-SchroderMT
- Amalgamation in CASL via Enriched Signatures (LS, TM, AT), pp. 993–1004.
- DAC-2000-ChaudhryBPE #analysis
- Current signature compression for IR-drop analysis (RC, DB, RP, TE), pp. 162–167.
- ICPR-v2-2000-HuangY #using #verification
- Signature Verification using Fractal Transformation (KH, HY), pp. 2851–2854.
- ICPR-v2-2000-RibaCVJ #classification #invariant
- Methods for Invariant Signature Classification (JRR, AC, SV, IJ), pp. 2953–2956.
- ICPR-v3-2000-KoubaroulisMK #multimodal #performance
- The Multimodal Signature Method: An Efficiency and Sensitivity Study (DK, JM, JK), pp. 3379–3382.
- ICPR-v4-2000-HatteryCLG #embedded #migration
- Optical Signatures of Small, Deeply Embedded, Tumor-Like Inclusions in Tissue-Like Turbid Media Based on a Random-Walk Theory of Photon Migration (DH, VC, MHL, AG), pp. 4348–4351.
- ICPR-v4-2000-OhishiKM #online #using #verification
- On-Line Signature Verification Using Pen-Position, Pen-Pressure and Pen-Inclination Trajectories (TO, YK, TM), pp. 4547–4550.
- ICPR-v4-2000-YamanyF #3d #recognition #using
- 3D Objects Coding and Recognition Using Surface Signatures (SMY, AAF), pp. 4571–4574.
- KDD-2000-CortesFPR #data type #named
- Hancock: a language for extracting signatures from data streams (CC, KF, DP, AR), pp. 9–17.
- DATE-1999-NovakHK #analysis #on the
- On Analog Signature Analysis (FN, BH, SK), p. 249–?.
- DATE-1999-RayaneVN #detection #embedded
- A One-Bit-Signature BIST for Embedded Operational Amplifiers in Mixed-Signal Circuits Based on the Slew-Rate Detection (IR, JVM, MN), p. 792–?.
- ICDAR-1999-CordellaFSV #approach #documentation #multi #validation
- Document Validation by Signature: A Serial Multi-Expert Approach (LPC, PF, CS, MV), pp. 601–604.
- ICDAR-1999-FangWLTKTW #approach #verification
- A Smoothness Index based Approach for Off-line Signature Verification (BF, YYW, CHL, YYT, PCKK, KWT, YKW), pp. 785–787.
- ICDAR-1999-Hobby #classification #composition #geometry #layout
- Page Decomposition and Signature Finding via Shape Classification and Geometric Layout (JDH), pp. 555–558.
- ICDAR-1999-LecceDGIPSS #automation #verification
- Selection of Reference Signatures for Automatic Signature Verification (VDL, GD, AG, SI, GP, AS, LS), pp. 597–600.
- ICDAR-1999-MizukamiMYY #using #verification
- An Off-line Signature Verification System using an Extraction Displacement Function (YM, HM, MY, IY), pp. 757–760.
- PASTE-1999-Preston #fortran #legacy
- New Type Signatures for Legacy Fortran Subroutines (NWP), pp. 76–85.
- ICFP-1999-Shao
- Transparent Modules with Fully Syntactic Signatures (ZS), pp. 220–232.
- ICEIS-1999-FanCY
- Blind Signatures with Double-Hashes Messages for Fair Electronic Elections and Ownership Claimable Digital Cash (CIF, WKC, YSY), pp. 612–618.
- SAC-1999-KocberberC #information retrieval #multi #performance
- Compressed Multi-Framed Signature Files: An Index Structure for Fast Information Retrieval (SK, FC), pp. 221–226.
- DATE-1998-GhoshKBH #benchmark #equivalence #invariant #metric #synthesis
- Synthesis of Wiring Signature-Invariant Equivalence Class Circuit Mutants and Applications to Benchmarking (DG, NK, FB, JEHI), pp. 656–663.
- ICPR-1998-BouletreauVSE #identifier #question
- Handwriting and signature: one or two personality identifiers? (VB, NV, RS, HE), pp. 1758–1760.
- ICPR-1998-ChenHS #analysis #email
- E-mail signature block analysis (HC, JH, RS), pp. 1153–1156.
- ICPR-1998-DolfingAO #markov #modelling #online #verification
- On-line signature verification with hidden Markov models (JGAD, EHLA, JJGMVO), pp. 1309–1312.
- ICPR-1998-RigollK #comparison #markov #modelling #online #verification
- A systematic comparison between on-line and off-line methods for signature verification with hidden Markov models (GR, AK), pp. 1755–1757.
- ICPR-1998-ZhangFY98a #verification
- Handwritten signature verification based on neural “gas” based vector quantization (BZ, MF, HY), pp. 1862–1864.
- EDTC-1997-AbdullaRK #embedded #multi
- A scheme for multiple on-chip signature checking for embedded SRAMs (MFA, CPR, AK), p. 625.
- ICDAR-1997-KashiHNT #markov #online #using #verification
- On-line Handwritten Signature Verification using Hidden Markov Model Features (RSK, JH, WLN, WT), pp. 253–257.
- ICDAR-1997-MartensC #online #optimisation #programming
- Dynamic Programming Optimisation for On-line Signature Verificatio (RM, LJMC), pp. 653–656.
- ICDAR-1997-MartensC97a #online #verification
- On-line Signature Verification: Discrimination Emphasised (RM, LJMC), pp. 657–660.
- ICDAR-1997-SabourinDW #matrix #verification
- Shape Matrices as a Mixed Shape Factor for Off-line Signature Verification (RS, JPD, ESW), pp. 661–666.
- ICDAR-1997-SchmidtK #automation #personalisation #verification
- Establishment of Personalized Templates for Automatic Signature Verification (CS, KFK), pp. 263–267.
- ICDAR-1997-Wirtz #prototype #verification
- Average prototypes for stroke-based signature verification (BW), pp. 268–272.
- VLDB-1997-ChakrabartiDAR #database #navigation #taxonomy #using
- Using Taxonomy, Discriminants, and Signatures for Navigating in Text Databases (SC, BD, RA, PR), pp. 446–455.
- CIKM-1996-ShinKC #named #performance #query
- S-signature: A New Scheme for Efficient Query Processing of Complex Objects in OODB (HS, KK, JWC), pp. 207–214.
- ICPR-1996-Ben-ArieWR #invariant #recognition
- Iconic recognition with affine-invariant spectral signatures (JBA, ZW, KRR), pp. 672–676.
- ICPR-1996-Kimmel #difference #image
- Affine differential signatures for gray level images of planar shapes (RK), pp. 45–49.
- ICPR-1996-LeeL #verification
- An off-line method for human signature verification (LLL, MGL), pp. 195–198.
- ICPR-1996-LeeL96a #image
- A lossless image compression method for human static signatures (LLL, MGL), pp. 910–913.
- ICPR-1996-MartensC #online #verification
- On-line signature verification by dynamic time-warping (RM, LJMC), pp. 38–42.
- ICPR-1996-SabourinGP #verification
- Pattern spectrum as a local shape factor for off-line signature verification (RS, GG, FJP), pp. 43–48.
- ICPR-1996-TangLMLLS #approach #novel #recognition
- A novel approach to optical character recognition based on ring-projection-wavelet-fractal signatures (YYT, BFL, HM, JL, CHL, CYS), pp. 325–329.
- PLILP-1996-AponteC #morphism
- Type Isomorphisms for Module Signatures (MVA, RDC), pp. 334–346.
- POPL-1996-Jones #composition #using
- Using Parameterized Signatures to Express Modular Structure (MPJ), pp. 68–78.
- SAC-1996-HashemiSHL #identification #testing #using
- Identifying and testing of signatures for non-volatile biomolecules using tandem mass spectra (RRH, TMS, WGH, JOL), pp. 44–49.
- ICDAR-v1-1995-BaeF #automation #parallel #verification
- Parallelism in dynamic time warping for automatic signature verification (YJB, MCF), pp. 426–429.
- ICDAR-v1-1995-BauerW #automation #parametricity #personalisation #reduction #verification
- Parameter reduction and personalized parameter selection for automatic signature verification (FB, BW), pp. 183–186.
- ICDAR-v1-1995-HanS #identification
- Signature identification via local association of features (KH, IKS), pp. 187–190.
- ICDAR-v1-1995-LiangLY #query
- False hits of tri-syllabic queries in a Chinese signature file (TL, SYL, WPY), pp. 159–162.
- ICDAR-v1-1995-MurshedBS #approach #verification
- Off-line signature verification, without a priori knowledge of class /spl omega//sub 2/. A new approach (NAM, FB, RS), pp. 191–196.
- ICDAR-v1-1995-SabourinG #approach #classification #evaluation #multi #verification
- An extended-shadow-code based approach for off-line signature verification. II. Evaluation of several multi-classifier combination strategies (RS, GG), pp. 197–201.
- ICDAR-v1-1995-Wirtz #verification
- Stroke-based time warping for signature verification (BW), pp. 179–182.
- ICDAR-v1-1995-XiaoD #online #verification
- A hierarchical on-line Chinese signature verification system (XHX, RWD), pp. 202–205.
- ICDAR-v2-1995-DrouhardSG #case study #classification #comparative #nearest neighbour #network #using #verification
- Comparative study of the k nearest neighbour, threshold and neural network classifiers for handwritten signature verification using an enhanced directional PDF (JPD, RS, MG), pp. 807–810.
- ICDAR-v2-1995-KimPK #online #personalisation #set #verification
- Applying personalized weights to a feature set for on-line signature verification (SHK, MSP, JK), pp. 882–885.
- ICDAR-v2-1995-Lee #verification
- Neural approaches for human signature verification (LLL), pp. 1055–1058.
- ICDAR-v2-1995-TangMMLS #analysis #approach #documentation
- A new approach to document analysis based on modified fractal signature (YYT, HM, XM, DL, CYS), pp. 567–570.
- ICDAR-v2-1995-Ueda #using
- Extraction of signature and seal imprint from bankchecks by using color information (KU), pp. 665–668.
- CIKM-1995-KimC #information retrieval #parallel #performance
- A New Parallel Signature File Method for Efficient Information Retrieval (JKK, JWC), pp. 66–73.
- POPL-1995-Biswas #higher-order
- Higher-Order Functors with Transparent Signatures (SKB), pp. 154–163.
- EDAC-1994-Stroele #analysis
- Signature Analysis for Sequential Circuits with Reset (APS), pp. 113–118.
- LFP-1994-BiagioniHLM #ml #network #protocol #stack #standard
- Signatures for a Network Protocol Stack: A Systems Application of Standard ML (EB, RH, PL, BM), pp. 55–64.
- DAC-1993-McGeerSBS #logic #named
- Espresso-Signature: A New Exact Minimizer for Logic Functions (PCM, JVS, RKB, ALSV), pp. 618–624.
- ICDAR-1993-ChangWS #verification
- Dynamic handwritten Chinese signature verification (HDC, JFW, HMS), pp. 258–261.
- ICDAR-1993-GazzoloB #identification #realtime #recognition
- Real time signature recognition: A method for personal identification (GG, LB), pp. 707–709.
- ICDAR-1993-SabourinCG #approach #verification
- An extended-shadow-code based approach for off-line signature verification (RS, MC, GG), pp. 1–5.
- SIGMOD-1993-Guting #higher-order #modelling #optimisation #query #specification
- Second-Order Signature: A Tool for Specifying Data Models, Query Processing, and Optimization (RHG), pp. 277–286.
- SIGMOD-1993-IshikawaKO #evaluation #set
- Evaluation of Signature Files as Set Access Facilities in OODBs (YI, HK, NO), pp. 247–256.
- VLDB-1993-ZezulaCT #parallel
- Hamming Filters: A Dynamic Signature File Organization for Parallel Stores (PZ, PC, PT), pp. 314–327.
- SIGIR-1993-AktugC #analysis #multi #query
- Analysis of Multiterm Queries in a Dynamic Signature File Organization (DA, FC), pp. 96–105.
- FSE-1993-ZaremskiW #reuse
- Signature Matching: A Key to Reuse (AMZ, JMW), pp. 182–190.
- SIGIR-1992-GrandiTZ #parallel
- Frame-Sliced Partitioned Parallel Signature Files (FG, PT, PZ), pp. 286–297.
- POPL-1992-Tofte #higher-order
- Principal Signatures for Higher-Order Program Modules (MT), pp. 189–199.
- SIGIR-1991-Rabitti #image #multi #query
- Image Query Processing Based on Multi-Level Signatures (FR, PS), pp. 305–314.
- STOC-1990-Rompel
- One-Way Functions are Necessary and Sufficient for Secure Signatures (JR), pp. 387–394.
- SIGIR-1990-RabittiZ #database #multi
- A Dynamic Signature Technique for Multimedia Databases (FR, PZ), pp. 193–210.
- SIGIR-1990-Sacks-DavisW #analysis #documentation #retrieval #using
- Using Syntactic Analysis in a Document Retrieval System that uses Signature Files (RSD, PW), pp. 179–192.
- VLDB-1989-ChangS #database
- A Signature Access Method for the Starburst Database System (WWC, HJS), pp. 145–153.
- SIGIR-1989-ChangLL #clustering #data access #multi
- Multikey Access Methods Based on Term Discrimination and Signature Clustering (JWC, JHL, YJL), pp. 176–185.
- DAC-1987-TanTBVP #performance #self #simulation
- A Fast Signature Simulation Tool for Built-In Self-Testing Circuits (SBT, KT, KB, PV, RP), pp. 17–25.
- SIGIR-1986-Deppisch #named #retrieval
- S-Tree: A Dynamic Balanced Signature Index for Office Retrieval (UD), pp. 77–87.
- SIGMOD-1985-Faloutsos #comparison #design #performance
- Signature files: Design and Performance Comparison of Some Signature Extraction Methods (CF), pp. 63–82.
- VLDB-1985-FaloutsosC #design #query
- Design of a Signature File Method that Accounts for Non-Uniform Occurrence and Query Frequencies (CF, SC), pp. 165–170.
- STOC-1984-OngSS #equation #performance #polynomial
- An Efficient Signature Scheme Based on Quadratic Equations (HO, CPS, AS), pp. 208–216.
- STOC-1983-GoldwasserMY
- Strong Signature Schemes (SG, SM, ACCY), pp. 431–439.
- STOC-1982-Carter #formal method #testing
- The Theory of Signature Testing for VLSI (JLC), pp. 66–76.
- ICALP-1981-Lieberherr #complexity
- Uniform Complexity and Digital Signatures (KJL), pp. 530–543.