311 papers:
CASE-2015-JiaJCS #locality #named #using- SoundLoc: Accurate room-level indoor localization using acoustic signatures (RJ, MJ, ZC, CJS), pp. 186–193.
DAC-2015-FernandezJAQVC15a #manycore #off the shelf #resource management- Resource usage templates and signatures for COTS multicore processors (GF, JJ, JA, EQ, TV, FJC), p. 6.
STOC-2015-GorbunovVW #standard- Leveled Fully Homomorphic Signatures from Standard Lattices (SG, VV, DW), pp. 469–477.
ICALP-v1-2015-FaonioNV- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation (AF, JBN, DV), pp. 456–468.
CSCW-2015-MaddockSASOM #behaviour #multi #online #using- Characterizing Online Rumoring Behavior Using Multi-Dimensional Signatures (JM, KS, HJAH, DES, MO, RMM), pp. 228–241.
ECIR-2015-ChappellGZ #approximate #nearest neighbour #slicing- Approximate Nearest-Neighbour Search with Inverted Signature Slice Lists (TC, SG, GZ), pp. 147–158.
DAC-2014-OderPG- Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices (TO, TP, TG), p. 6.
DATE-2014-AndradesRC #design #detection- Signature indexing of design layouts for hotspot detection (CA, MAR, CCC), pp. 1–6.
DATE-2014-CaplanMMM #execution #reliability #trade-off- Trade-offs in execution signature compression for reliable processor systems (JC, MIM, PM, BHM), pp. 1–6.
DRR-2014-LiPLD #analysis #online #verification- On-line signature verification method by Laplacian spectral analysis and dynamic time warping (CL, LP, CL, XD), p. ?–10.
FM-2014-WenMM #analysis #formal method #information management #towards- Towards a Formal Analysis of Information Leakage for Signature Attacks in Preferential Elections (RW, AM, CM), pp. 595–610.
HCI-AIMT-2014-RoshandelMMTK #3d #authentication #multi- Multi-sensor Finger Ring for Authentication Based on 3D Signatures (MR, AM, PM, ST, HK), pp. 131–138.
CIKM-2014-UysalBSS #approximate #database #distance #multi #performance #scalability #using- Efficient Filter Approximation Using the Earth Mover’s Distance in Very Large Multimedia Databases with Feature Signatures (MSU, CB, JS, TS), pp. 979–988.
ICPR-2014-BekhetA #using #video- Compact Signature-Based Compressed Video Matching Using Dominant Color Profiles (DCP) (SB, AA), pp. 3933–3938.
ICPR-2014-DuDA #modelling #topic #using- Signature Matching Using Supervised Topic Models (XD, DSD, WAA), pp. 327–332.
ICPR-2014-OzkanEA #detection #video #visual notation- Visual Group Binary Signature for Video Copy Detection (SÖ, EE, GBA), pp. 3945–3950.
ICPR-2014-SavakisRP #difference #gesture #learning #using- Gesture Control Using Active Difference Signatures and Sparse Learning (AES, RR, RWP), pp. 3969–3974.
ICPR-2014-Wilson #graph #modelling #network- Graph Signatures for Evaluating Network Models (RCW), pp. 100–105.
MoDELS-2014-OgunyomiRK #incremental #model-to-text #on the- On the Use of Signatures for Source Incremental Model-to-text Transformation (BO, LMR, DSK), pp. 84–98.
MoDELS-2014-OgunyomiRK #incremental #model-to-text #on the- On the Use of Signatures for Source Incremental Model-to-text Transformation (BO, LMR, DSK), pp. 84–98.
PADL-2014-WinantDPS #haskell- Partial Type Signatures for Haskell (TW, DD, FP, TS), pp. 17–32.
SAC-2014-ZandVYK #detection- Extracting probable command and control signatures for detecting botnets (AZ, GV, XY, CK), pp. 1657–1662.
CGO-2014-KashyapH #security- Security Signature Inference for JavaScript-based Browser Addons (VK, BH), p. 219.
ICST-2014-AydinAB #automation #generative #testing- Automated Test Generation from Vulnerability Signatures (AA, MA, TB), pp. 193–202.
ISSTA-2014-ZuoKS #debugging #mining #performance- Efficient predicated bug signature mining via hierarchical instrumentation (ZZ, SCK, CS), pp. 215–224.
DAC-2013-ZhangLSSR #automation #clustering- Automatic clustering of wafer spatial signatures (WZ, XL, SS, AJS, RAR), p. 6.
DATE-2013-LiuN #multi- Radar signature in multiple target tracking system for driver assistant application (HL, SN), pp. 887–892.
ICDAR-2013-DuAD #multi #scalability #using- Large-Scale Signature Matching Using Multi-stage Hashing (XD, WAA, DSD), pp. 976–980.
ICDAR-2013-GriechischML #analysis #online- Online Signature Analysis Based on Accelerometric and Gyroscopic Pens and Legendre Series (EG, MIM, ML), pp. 374–378.
ICDAR-2013-HuC #classification #pseudo #using #verification- Offline Signature Verification Using Real Adaboost Classifier Combination of Pseudo-dynamic Features (JH, YC), pp. 1345–1349.
ICDAR-2013-KamihiraOWK #verification- Improvement of Japanese Signature Verification by Segmentation-Verification (YK, WO, TW, FK), pp. 379–382.
ICDAR-2013-KhanKS #identification #problem #question #verification- Can Signature Biometrics Address Both Identification and Verification Problems? (SHK, ZK, FS), pp. 981–985.
ICDAR-2013-MalikALD #forensics #realtime #verification- FREAK for Real Time Forensic Signature Verification (MIM, SA, ML, AD), pp. 971–975.
ICDAR-2013-MalikLAOBF #contest #identification #verification- ICDAR 2013 Competitions on Signature Verification and Writer Identification for On- and Offline Skilled Forgeries (SigWiComp 2013) (MIM, ML, LA, WO, MB, BF), pp. 1477–1483.
ICDAR-2013-MalikLD #automation #comparison #forensics #verification- Part-Based Automatic System in Comparison to Human Experts for Forensic Signature Verification (MIM, ML, AD), pp. 872–876.
ICDAR-2013-ZhangT #documentation #kernel #keyword- Segmentation-Free Keyword Spotting for Handwritten Documents Based on Heat Kernel Signature (XZ, CLT), pp. 827–831.
PASTE-2013-Lu #automation #mining- Automatically mining program build information via signature matching (CDL), pp. 25–32.
STOC-2013-CaiGW- A complete dichotomy rises from the capture of vanishing signatures: extended abstract (JYC, HG, TW), pp. 635–644.
ICALP-v2-2013-ImNP #data type #parametricity #recursion- Contractive Signatures with Recursive Types, Type Parameters, and Abstract Types (HI, KN, SP), pp. 299–311.
DUXU-NTE-2013-KulkarniW #energy #using- Classifying Energy-Related Events Using Electromagnetic Field Signatures (ASK, KCW), pp. 105–111.
SEKE-2013-ZhangLK #debugging #on the #statistics- On the Use of Bug and Predicate Signatures for Statistical Debugging (YZ, EL, BK), pp. 249–299.
ESEC-FSE-2013-SunK #debugging #mining- Mining succinct predicated bug signatures (CS, SCK), pp. 576–586.
ICSE-2013-AlmorsyGI #analysis #architecture #automation #security #using- Automated software architecture security risk analysis using formalized signatures (MA, JG, ASI), pp. 662–671.
HPCA-2013-KayaalpSNPA #architecture #named #reuse- SCRAP: Architecture for signature-based protection from Code Reuse Attacks (MK, TS, JN, DP, NBAG), pp. 258–269.
LCTES-2013-KhudiaM #control flow #low cost #using- Low cost control flow protection using abstract control signatures (DSK, SAM), pp. 3–12.
ASE-2012-AlmorsyGI #analysis #automation #using- Supporting automated vulnerability analysis using formalized vulnerability signatures (MA, JG, ASI), pp. 100–109.
DRR-2012-CoetzerSS #collaboration #human-computer #performance #verification- Efficient cost-sensitive human-machine collaboration for offline signature verification (JC, JPS, RS).
CIAA-2012-AmarniL #kernel #sequence- Factor and Subsequence Kernels and Signatures of Rational Languages (AA, SL), pp. 313–320.
ICPR-2012-AnoopMBBR #representation #set- Covariance profiles: A signature representation for object sets (AKA, AM, UDB, CB, KRR), pp. 2541–2544.
ICPR-2012-AzizWH #using- Shape signature using the edge-based Laplacian (FA, RCW, ERH), pp. 1594–1597.
ICPR-2012-KennardBS #2d #approach #detection #geometry #using #verification- Offline signature verification and forgery detection using a 2-D geometric warping approach (DJK, WAB, TWS), pp. 3733–3736.
ICPR-2012-MarieLM #invariant #locality #recognition #visual notation- Invariant signatures for omnidirectional visual place recognition and robot localization in unknown environments (RM, OLI, EMM), pp. 2537–2540.
ICPR-2012-OReillyP- Looking for the brain stroke signature (CO, RP), pp. 1811–1814.
ICPR-2012-PollardSA #forensics #image- Print biometrics: Recovering forensic signatures from halftone images (SBP, SJS, GBA), pp. 1651–1654.
ICPR-2012-ThakoorB #classification #video- Structural signatures for passenger vehicle classification in video (NT, BB), pp. 926–929.
SAC-2012-OyamaGCSK #detection- Detecting malware signatures in a thin hypervisor (YO, TTDG, YC, TS, KK), pp. 1807–1814.
CGO-2012-VankaT #data flow #dependence #performance #profiling #using- Efficient and accurate data dependence profiling using software signatures (RV, JT), pp. 186–195.
ASE-2011-HillPV #code search #natural language #source code- Improving source code search with natural language phrasal representations of method signatures (EH, LLP, KVS), pp. 524–527.
DAC-2011-KungHSS #optimisation- Thermal signature: a simple yet accurate thermal index for floorplan optimization (JK, IH, SSS, YS), pp. 108–113.
ICDAR-2011-GalballyFMP #analysis #quality- Quality Analysis of Dynamic Signature Based on the Sigma-Lognormal Model (JG, JFA, MMD, RP), pp. 633–637.
ICDAR-2011-LiwickiMHCBSBF #contest #online #verification- Signature Verification Competition for Online and Offline Skilled Forgeries (SigComp2011) (ML, MIM, CEvdH, XC, CB, RS, MB, BF), pp. 1480–1484.
ICDAR-2011-MandalRP #documentation #random #segmentation #using- Signature Segmentation from Machine Printed Documents Using Conditional Random Field (RM, PPR, UP), pp. 1170–1174.
ICDAR-2011-NguyenB #2d #feature model #verification- An Application of the 2D Gaussian Filter for Enhancing Feature Extraction in Off-line Signature Verification (VN, MB), pp. 339–343.
ICDAR-2011-ParodiGB #approach #feature model #invariant #verification- A Circular Grid-Based Rotation Invariant Feature Extraction Approach for Off-line Signature Verification (MP, JCG, AB), pp. 1289–1293.
ICDAR-2011-WangWZ #graph #online #using #verification- On-line Signature Verification Using Segment-to-Segment Graph Matching (KW, YW, ZZ), pp. 804–808.
SIGMOD-2011-QinWLXL #performance #query #similarity #symmetry- Efficient exact edit similarity query processing with the asymmetric signature scheme (JQ, WW, YL, CX, XL), pp. 1033–1044.
DHM-2011-Ng #3d #design- Three-Dimensional Grading of Virtual Garment with Design Signature Curves (RN), pp. 328–336.
ICEIS-v1-2011-RamirezC #fault #process #using- Fault Diagnosis of Batch Processes Release using PCA Contribution Plots as Fault Signatures (AWR, JCL), pp. 223–228.
CIKM-2011-GevaV #documentation #named- TOPSIG: topology preserving document signatures (SG, CMDV), pp. 333–338.
CIKM-2011-KrulisLBSS #architecture #distance #gpu #manycore #polynomial- Processing the signature quadratic form distance on many-core GPU architectures (MK, JL, CB, TS, TS), pp. 2373–2376.
CIKM-2011-LiCBZH #clustering #semantics- Facilitating pattern discovery for relation extraction with semantic-signature-based clustering (YL, VC, SB, HZ, HH), pp. 1415–1424.
SAC-2011-Muramatsu #algorithm #online #random #verification- Random forgery attacks against DTW-based online signature verification algorithm (DM), pp. 27–28.
CASE-2010-RodriguezBMRW #analysis #assembly #detection- Failure detection in assembly: Force signature analysis (AR, DB, MTM, GFR, JW), pp. 210–215.
DATE-2010-GomezSBF- Analog circuit test based on a digital signature (AG, RS, LB, JF), pp. 1641–1644.
DRR-2010-ChenL #on the #pseudo #security #usability- On the usability and security of pseudo-signatures (JC, DPL), pp. 1–10.
CSMR-2010-OlivetoKAG #approach- Numerical Signatures of Antipatterns: An Approach Based on B-Splines (RO, FK, GA, YGG), pp. 248–251.
ICEIS-AIDSS-2010-BarbantanLP #recognition- A Hierarchical Handwritten Offline Signature Recognition System (IB, CL, RP), pp. 139–147.
ICEIS-DISI-2010-AndreiRD #authentication #online- Solutions for Speeding-up On-line Dynamic Signature Authentication (VA, SMR, SD), pp. 121–126.
ICEIS-J-2010-PotoleaBL #approach #recognition- A Hierarchical Approach for the Offline Handwritten Signature Recognition (RP, IB, CL), pp. 264–279.
ICPR-2010-BatistaGS #difference #representation #verification- Applying Dissimilarity Representation to Off-Line Signature Verification (LB, EG, RS), pp. 1293–1297.
ICPR-2010-BazzaniCPFM #identification #multi- Multiple-Shot Person Re-identification by HPE Signature (LB, MC, AP, MF, VM), pp. 1413–1416.
ICPR-2010-DonoserRB #prototype #recognition- Shape Prototype Signatures for Action Recognition (MD, HR, HB), pp. 1796–1799.
ICPR-2010-GrazziniS #image- Iterative Ramp Sharpening for Structure/Signature-Preserving Simplification of Images (JG, PS), pp. 4585–4588.
ICPR-2010-IbrahimKKG #analysis #online #using #verification- On-Line Signature Verification Using 1-D Velocity-Based Directional Analysis (MTI, MJK, MAK, LG), pp. 3830–3833.
ICPR-2010-KumarCCAPH #classification #complexity #using- Heart Murmur Classification Using Complexity Signatures (DK, PC, RC, MA, RPP, JH), pp. 2564–2567.
ICPR-2010-LvBYD #using #verification #visual notation- Off-Line Signature Verification Using Graphical Model (HL, XB, WY, JD), pp. 3784–3788.
ICPR-2010-MakiharaHY #how #question- How to Control Acceptance Threshold for Biometric Signatures with Different Confidence Values? (YM, MAH, YY), pp. 1208–1211.
ICPR-2010-PatrauceanGC #identification #invariant #using- Bubble Tag Identification Using an Invariant — Under — Perspective Signature (VP, PG, JC), pp. 408–411.
ICPR-2010-PuS #learning #probability #verification- Probabilistic Measure for Signature Verification Based on Bayesian Learning (DP, SNS), pp. 1188–1191.
KDD-2010-SundaravaradanHSSVHR #biology #modelling- Extracting temporal signatures for comprehending systems biology models (NS, KSMTH, VS, DJS, JPCV, LSH, NR), pp. 453–462.
SAC-2010-LeeST #algorithm #database #incremental #performance- An incremental algorithm for efficient unique signature discoveries on DNA databases (HPL, TFS, CYT), pp. 1506–1510.
SAC-2010-ZeffererK #database- An electronic-signature based circular resolution database system (TZ, TK), pp. 1840–1845.
HPDC-2010-JabriM #using- Authorization within grid-computing using certificateless identity-based proxy signature (MAJ, SM), pp. 292–295.
CSL-2010-SternagelT #dependence #proving #termination- Signature Extensions Preserve Termination — An Alternative Proof via Dependency Pairs (CS, RT), pp. 514–528.
ASE-2009-YuAB #analysis #generative #source code #string #using- Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses (FY, MA, TB), pp. 605–609.
ICDAR-2009-Alonso-FernandezFGGO #robust #verification- Robustness of Signature Verification Systems to Imitators with Increasing Skills (FAF, JF, AG, JG, JOG), pp. 728–732.
ICDAR-2009-BatistaGS #approach #multi #verification- A Multi-Hypothesis Approach for Off-Line Signature Verification with HMMs (LB, EG, RS), pp. 1315–1319.
ICDAR-2009-BlankersHFV #contest #verification- ICDAR 2009 Signature Verification Competition (VLB, CEvdH, KF, LV), pp. 1403–1407.
ICDAR-2009-BonillaFGH #pseudo #verification- Offline Signature Verification Based on Pseudo-Cepstral Coefficients (JFVB, MAFB, CMTG, JBAH), pp. 126–130.
ICDAR-2009-ChenLM #pseudo #towards- Toward Resisting Forgery Attacks via Pseudo-Signatures (JC, DPL, FM), pp. 51–55.
ICDAR-2009-FairhurstA #predict #profiling- An Investigation of Predictive Profiling from Handwritten Signature Data (MCF, MCDCA), pp. 1305–1309.
ICDAR-2009-GalballyFMO #evaluation #using #verification- Evaluation of Brute-force Attack to Dynamic Signature Verification Using Synthetic Samples (JG, JF, MMD, JOG), pp. 131–135.
ICDAR-2009-GalballyFMO09a- Improving the Enrollment in Dynamic Signature Verfication with Synthetic Samples (JG, JF, MMD, JOG), pp. 1295–1299.
ICDAR-2009-IbrahimKKAG #analysis #dependence #online #using #verification- On-Line Signature Verification: Directional Analysis of a Signature Using Weighted Relative Angle Partitions for Exploitation of Inter-Feature Dependencies (MTI, MJK, MAK, KSA, LG), pp. 41–45.
ICDAR-2009-LuqmanBR #classification #graph #network #recognition #using- Graphic Symbol Recognition Using Graph Based Signature and Bayesian Network Classifier (MML, TB, JYR), pp. 1325–1329.
ICDAR-2009-MuramatsuYM #authentication #online #using- Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition (DM, KY, TM), pp. 46–50.
ICDAR-2009-NguyenBL #problem #verification- Global Features for the Off-Line Signature Verification Problem (VN, MB, GL), pp. 1300–1304.
ICDAR-2009-PrakashG #geometry #verification- Geometric Centroids and their Relative Distances for Off-line Signature Verification (HNP, DSG), pp. 121–125.
ICSM-2009-DraganCM #using- Using method stereotype distribution as a signature descriptor for software systems (ND, MLC, JIM), pp. 567–570.
CIKM-2009-LuHM #algorithm #approximate #performance #using- Efficient algorithms for approximate member extraction using signature-based inverted lists (JL, JH, XM), pp. 315–324.
CIKM-2009-MouzaLRS #algebra #n-gram #named #string #using- AS-index: a structure for string search using n-grams and algebraic signatures (CdM, WL, PR, TJES), pp. 295–304.
KDIR-2009-LamB #categorisation #invariant #multi #using- Invariant Categorisation of Polygonal Objects using Multi-resolution Signatures (RL, JMHdB), pp. 168–173.
SAC-2009-ZaidiBC #network #protocol #testing- Network protocol interoperability testing based on contextual signatures and passive testing (FZ, EB, ARC), pp. 2–7.
HPCA-2009-ReddiGHWSB #predict #using- Voltage emergency prediction: Using signatures to reduce operating margins (VJR, MSG, GHH, GYW, MDS, DMB), pp. 18–29.
ISSTA-2009-ChengLZWY #debugging #graph #identification #mining #using- Identifying bug signatures using discriminative graph mining (HC, DL, YZ, XW, XY), pp. 141–152.
ASE-2008-HsuJO #agile #debugging #identification #named #process- Rapid: Identifying Bug Signatures to Support Debugging Activities (HYH, JAJ, AO), pp. 439–442.
CASE-2008-WangSF #automation #detection #difference #equation- Partial differential equation-based GPR signature discrimination for automatic detection of bridge deck delamination (ZWW, GGS, TF), pp. 431–435.
DAC-2008-Abdollahi- Signature based Boolean matching in the presence of don’t cares (AA), pp. 642–647.
VLDB-2008-KunduB #data type- Structural signatures for tree data structures (AK, EB), pp. 138–150.
ICALP-C-2008-KurosawaF #composition- Universally Composable Undeniable Signature (KK, JF), pp. 524–535.
SOFTVIS-2008-Panas #visualisation- Signature visualization of software binaries (TP), pp. 185–188.
ICEIS-HCI-2008-LailaAN #online- Applying Kansei Engineering to Determine Emotional Signature of Online Clothing Websites (NLMN, MLA, MN), pp. 142–147.
ICPR-2008-IbrahimG #online #using #verification- On-line signature verification by using most discriminating points (MTI, LG), pp. 1–4.
ICPR-2008-LiuW #online #verification- Template selection for on-line signature verification (NL, YW), pp. 1–4.
ICPR-2008-MottlLSY #kernel #online #verification- Signature verification based on fusion of on-line and off-line kernels (VM, ML, VS, AY), pp. 1–4.
ICPR-2008-PesarinCMDPT #automation #classification #statistics- A statistical signature for automatic dialogue classification (AP, MC, VM, CD, AP, AT), pp. 1–4.
ASPLOS-2008-ShenZDLSZ #hardware #on the fly- Hardware counter driven on-the-fly request signatures (KS, MZ, SD, CL, CS, XZ), pp. 189–200.
ASPLOS-2008-TuckACT #analysis #hardware #named #optimisation- SoftSig: software-exposed hardware signatures for code analysis and optimization (JT, WA, LC, JT), pp. 145–156.
ICDAR-2007-AraujoCF #approach #online #verification- An Approach to Improve Accuracy Rate of On-line Signature Verification Systems of Different Sizes (RA, GDCC, ECBCF), pp. 332–336.
ICDAR-2007-ChangS #online #verification- Modified Dynamic Time Warping for Stroke-Based On-line Signature Verification (WC, JS), pp. 724–728.
ICDAR-2007-CoetzerS #verification- A Human-Centric Off-Line Signature Verification System (HC, RS), pp. 153–157.
ICDAR-2007-FreireFMO #fuzzy #on the- On the Applicability of Off-Line Signatures to the Fuzzy Vault Construction (MRF, JFA, MMD, JOG), pp. 1173–1177.
ICDAR-2007-LladosS #documentation #word- Indexing Historical Documents by Word Shape Signatures (JL, GS), pp. 362–366.
ICDAR-2007-Martinez-DiazFFO #on the #verification- On The Effects of Sampling Rate and Interpolation in HMM-Based Dynamic Signature Verification (MMD, JFA, MRF, JOG), pp. 1113–1117.
ICDAR-2007-NguyenBML #classification #using #verification- Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines (VN, MB, VM, GL), pp. 734–738.
ICDAR-2007-RabasseGF #synthesis- A Method for the Synthesis of Dynamic Biometric Signature Data (CR, RMG, MCF), pp. 168–172.
ICDAR-2007-VargasFTA #corpus- Off-line Handwritten Signature GPDS-960 Corpus (FV, MAF, CMT, JBA), pp. 764–768.
ICDAR-2007-VargasFTA07a #image #performance #verification- Off-line Signature Verification System Performance against Image Acquisition Resolution (JFVB, MAFB, CMTG, JBA), pp. 834–838.
ICDAR-2007-ZhangL #recognition- A New Vectorial Signature for Quick Symbol Indexing, Filtering and Recognition (WZ, WL), pp. 536–540.
VLDB-2007-LitwinMRS #algebra #performance #string #using- Fast nGram-Based String Search Over Data Encoded Using Algebraic Signatures (WL, RM, PR, TJES), pp. 207–218.
ICALP-2007-BellareNN #strict- Unrestricted Aggregate Signatures (MB, CN, GN), pp. 411–422.
ICALP-2007-ChandranGS #random- Ring Signatures of Sub-linear Size Without Random Oracles (NC, JG, AS), pp. 423–434.
EDOC-2007-SunithaAK #using- Controlled Delegation in e-cheques Using Proxy Signatures (NRS, BBA, PK), pp. 414–422.
SAC-2007-MuSZ- Compact sequential aggregate signatures (YM, WS, HZ), pp. 249–253.
SAC-2007-SantosBOJ #approach #documentation #forensics #verification- Off-line signature verification based on forensic questioned document examination approach (CRS, FB, LSO, EJRJ), pp. 637–638.
HPCA-2007-MeixnerS #detection #fault #online- Error Detection via Online Checking of Cache Coherence with Token Coherence Signatures (AM, DJS), pp. 145–156.
TestCom-FATES-2007-SchmerlK #testing #towards- Towards Systematic Signature Testing (SS, HK), pp. 276–291.
DAC-2006-MochockiLCH #3d #estimation #mobile- Signature-based workload estimation for mobile 3D graphics (BM, KL, SC, XSH), pp. 592–597.
DAC-2006-Wang #detection #symmetry- Exploiting K-Distance Signature for Boolean Matching and G-Symmetry Detection (KHW), pp. 516–521.
DATE-2006-Kundu #analysis #design- A design for failure analysis (DFFA) technique to ensure incorruptible signatures (SK), pp. 309–310.
DRR-2006-ChenS #2d #recognition #verification- Combining one- and two-dimensional signal recognition approaches to off-line signature verification (SC, SNS).
ICSM-2006-KimW- Properties of Signature Change Patterns (SK, EJWJ), pp. 4–13.
ICALP-v2-2006-Vergnaud #verification- New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures (DV), pp. 58–69.
ICPR-v1-2006-BenjellounTM #detection #using- Vertebra Edge Detection Using Polar Signature (MB, HT, SM), pp. 476–479.
ICPR-v1-2006-DjiouaOP #interactive #recognition #verification- An interactive trajectory synthesizer to study outlier patterns in handwriting recognition and signature verification (MD, CO, RP), pp. 1124–1127.
ICPR-v2-2006-ChenS #graph #verification- A New Off-line Signature Verification Method based on Graph (SC, SNS), pp. 869–872.
ICPR-v2-2006-KhanKKA #dependence #online #verification- On-Line Signature Verification by Exploiting Inter-Feature Dependencies (MKK, MAK, MAUK, IA), pp. 796–799.
ICPR-v2-2006-MozaffarifF #online #recognition- One Dimensional Fractal Coder for Online Signature Recognition (SM, KF, FF), pp. 857–860.
ICPR-v2-2006-QuanHXLL #analysis #online #verification- Spectrum Analysis Based onWindows with Variable Widths for Online Signature Verification (ZHQ, DSH, XLX, MRL, TML), pp. 1122–1125.
ICPR-v4-2006-ArmandBM #verification- Off-line Signature Verification based on the Modified Direction Feature (SA, MB, VM), pp. 509–512.
SAC-2006-ChenSC #algorithm #evaluation #query- Tree inclusion algorithm, signatures and evaluation of path-oriented queries (YC, YS, YC), pp. 1020–1025.
DRR-2005-ChenD #feature model #verification- Sequence-matching-based feature extraction with applications to signature verification (YC, XD), pp. 76–83.
ICDAR-2005-ChenS #verification- Use of Exterior Contours and Shape Features in Off-line Signature Verification (SC, SNS), pp. 1280–1284.
ICDAR-2005-NakaiKI #documentation #image #invariant #retrieval- Camera-Based Document Image Retrieval as Voting for Partial Signatures of Projective Invariants (TN, KK, MI), pp. 379–383.
ICDAR-2005-RichiardiKD #feature model #online #verification- Local and Global Feature Selection for On-line Signature Verification (JR, HK, AD), pp. 625–629.
ICDAR-2005-RussellHBHM #using #verification- Dynamic Signature Verification Using Discriminative Training (GFR, JH, AB, AH, DM), pp. 1260–1264.
ICDAR-2005-WanW #modelling #online #statistics #verification- On-Line Signature Verification With Two-Stage Statistical Models (LW, BW), pp. 282–286.
MSR-2005-KimWB #analysis- Analysis of signature change patterns (SK, EJWJ, JB), pp. 16–20.
ICALP-2005-KiltzMPR- Append-Only Signatures (EK, AM, SP, BR), pp. 434–445.
ICALP-2005-LipmaaWB #security #verification- Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction (HL, GW, FB), pp. 459–471.
ICALP-2005-TrolinW- Hierarchical Group Signatures (MT, DW), pp. 446–458.
FM-2005-BasinKTW #architecture #verification- Verification of a Signature Architecture with HOL-Z (DAB, HK, KT, BW), pp. 269–285.
ICFP-2005-RamseyFG- An expressive language of signatures (NR, KF, PG), pp. 27–40.
CIKM-2005-NarasimhaT #database #named #outsourcing- DSAC: integrity for outsourced databases with signature aggregation and chaining (MN, GT), pp. 235–236.
MLDM-2005-Sy #approach #detection- Signature-Based Approach for Intrusion Detection (BKS), pp. 526–536.
PPDP-2005-CortierRZ #encryption #protocol #verification- A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures (VC, MR, EZ), pp. 12–22.
SAC-2005-LeeST #database #performance- Efficient discovery of unique signatures on whole-genome EST databases (HPL, TFS, YTT), pp. 100–104.
HPDC-2005-LuCSG #streaming #validation- A streaming validation model for SOAP digital signature (WL, KC, AS, DG), pp. 243–252.
TLCA-2005-PowerT- Binding Signatures for Generic Contexts (JP, MT), pp. 308–323.
DATE-v2-2004-LeiningerGM #configuration management- Diagnosis of Scan-Chains by Use of a Configurable Signature Register and Error-Correcting Code (AL, MG, PM), pp. 1302–1309.
DocEng-2004-BeheraLI #documentation #identification #image #visual notation- Visual signature based identification of Low-resolution document images (AB, DL, RI), pp. 178–187.
ICSM-2004-ZageZ #metric #visualisation- Module Metric Signature (MMS) Visualization (DZ, WZ), p. 512.
CIKM-2004-JingYKT #locality #performance #similarity #transaction- Localized signature table: fast similarity search on transaction data (QJ, RY, PK, AKHT), pp. 314–323.
ICPR-v1-2004-Li #authentication- Handwriting Authentication by Envelopes of Sound Signatures (FFL), pp. 401–404.
ICPR-v2-2004-Hammoud #visual notation- Color Texture Signatures for Art-Paintings vs. Scene-Photographs Based on Human Visual System (RIH), pp. 525–528.
ICPR-v2-2004-PranckevicieneBS #classification #identification- Consensus-Based Identification of Spectral Signatures for Classification of High-Dimensional Biomedical Spectra (EP, RB, RLS), pp. 319–322.
ICPR-v2-2004-SchimkeVD #adaptation #authentication #distance #online #using- Using Adapted Levenshtein Distance for On-Line Signature Authentication (SS, CV, JD), pp. 931–934.
ICPR-v3-2004-TamLN #geometry- Deformable Geometry Model Matching by Topological and Geometric Signatures (GKLT, RWHL, CWN), pp. 910–913.
KDD-2004-KolczCA #detection #robust- Improved robustness of signature-based near-replica detection via lexicon randomization (AK, AC, JA), pp. 605–610.
SAC-2004-BamasakZ #mobile- A secure method for signature delegation to mobile agents (OB, NZ), pp. 813–818.
SAC-2004-ChenC #database #graph #object-oriented- Signature file hierarchies and signature graphs: a new index method for object-oriented databases (YC, YC), pp. 724–728.
SAC-2004-HeZ- A new signature scheme: joint-signature (LSH, NZ), pp. 807–812.
SAC-2004-MatsushitaKI #distributed #peer-to-peer #using- Feature-based distributed object search using signatures in Peer-to-Peer environments (RM, HK, YI), pp. 729–734.
HPCA-2004-PengPL #performance- Signature Buffer: Bridging Performance Gap between Registers and Caches (LP, JKP, KL), pp. 164–175.
ASE-2003-LicataHK #evolution #source code- The Feature Signatures of Evolving Programs (DRL, CDH, SK), pp. 281–285.
DATE-2003-LupeaPJ #analysis #named- RF-BIST: Loopback Spectral Signature Analysis (DL, UP, HJJ), pp. 10478–10483.
ICDAR-2003-BovinoIPS #multi #verification- Multi-Expert Verification of Hand-Written Signatures (LB, SI, GP, LS), pp. 932–936.
ICDAR-2003-MuramatsuM #online #verification- An HMM On-line Signature Verifier Incorporating Signature Trajectories (DM, TM), pp. 438–442.
ICDAR-2003-ShafieiR #algorithm #markov #modelling #online #segmentation #using #verification- A New On-Line Signature Verification Algorithm Using Variable Length Segmentation and Hidden Markov Models (MMS, HRR), p. 443–?.
ICDAR-2003-Ueda #pattern matching #using #verification- Investigation of Off-Line Japanese Signature Verification Using a Pattern Matching (KU), p. 951–?.
ICDAR-2003-ZimmerL #hybrid #verification- A Hybrid On/Off Line Handwritten Signature Verification System (AZ, LLL), pp. 424–428.
ICDAR-2003-ZouTLL #analysis #online #using #verification- On-line Signature Verification Using Local Shape Analysis (MZ, JT, CL, ZL), pp. 314–318.
ICSM-2003-LimpiyakornB #comprehension #concept- Applying the Signature Concept to Plan-Based Program Understanding (YL, IB), p. 325–?.
STOC-2003-GennaroGK #bound #encryption #performance- Lower bounds on the efficiency of encryption and digital signature schemes (RG, YG, JK), pp. 417–425.
ICEIS-v1-2003-HoBE #approach #database #performance #xml- Efficient Storage for XML Databases: Vertical View Model with Signature-Based Approach (WH, LB, DE), pp. 55–62.
CIKM-2003-ConradGS #detection #documentation #online #reliability #retrieval- Online duplicate document detection: signature reliability in a dynamic retrieval environment (JGC, XSG, CPS), pp. 443–452.
SEKE-2003-LimpiyakornB #comprehension #knowledge-based- Integrating Signature Matching into Knowledge-Based Program Understanding (YL, IB), pp. 440–444.
DATE-2002-VoorakaranamCC #agile #framework #testing- A Signature Test Framework for Rapid Production Testing of RF Circuits (RV, SC, AC), pp. 186–191.
ICPR-v1-2002-SunCM #gesture #realtime #recognition- Real-Time Gesture Recognition System Based on Contour Signatures (XS, CWC, BSM), pp. 447–450.
ICPR-v1-2002-VielhauerSM #online #statistics- Biometric Hash based on Statistical Features of Online Signatures (CV, RS, AM), pp. 123–126.
ICPR-v3-2002-LauYT #estimation #sequence- Stroke Extraction and Stroke Sequence Estimation on Signatures (KKL, PCY, YYT), pp. 119–122.
ICPR-v3-2002-StevensSP #identification #using- Identifying Vehicles Using Vibrometry Signatures (MRS, MS, DP), pp. 253–256.
ICPR-v3-2002-Vasilescu #analysis #recognition #synthesis- Human Motion Signatures: Analysis, Synthesis, Recognition (MAOV), pp. 456–460.
SIGIR-2002-ParkPGK #analysis #documentation- Analysis of lexical signatures for finding lost or related documents (STP, DMP, CLG, RK), pp. 11–18.
SAC-2002-FerreiraD #embedded #mobile- Blinded-key signatures: securing private keys embedded in mobile agents (LCF, RD), pp. 82–86.
SAC-2002-NascimentoC #image #retrieval #using- Color-based image retrieval using binary signatures (MAN, VC), pp. 687–692.
DATE-2001-BayraktarogluO- Diagnosis for scan-based BIST: reaching deep into the signatures (IB, AO), pp. 102–111.
ICDAR-2001-HanmandluMCG #fuzzy #modelling #verification- Fuzzy Modeling Based Signature Verification System (MH, KRMM, SC, GGI), pp. 110–115.
ICDAR-2001-JustinoBS #random #using #verification- Off-line Signature Verification Using HMM for Random, Simple and Skilled Forgeries (EJRJ, FB, RS), pp. 1031–1034.
ICDAR-2001-LejtmanG #network #online #using #verification- On-line Handwritten Signature Verification Using Wavelets and Back-propagation Neural Networks (DZL, SEG), pp. 992–996.
ICDAR-2001-RheeCK #feature model #online #segmentation #using #verification- On-Line Signature Verification Using Model-Guided Segmentation and Discriminative Feature Selection for Skilled Forgeries (THR, SJC, JHK), pp. 645–649.
ICDAR-2001-TabboneWT- Indexing of Technical Line Drawings Based on F-Signatures (ST, LW, KT), pp. 1220–1224.
ICDAR-2001-TanabeYKMOI #automation #verification- Automatic Signature Verification Based on the Dynamic Feature of Pressure (KT, MY, HK, SM, SO, TI), pp. 1045–1049.
ICDAR-2001-VielhauerSM #transitive #verification- Transitivity Based Enrollment Strategy for Signature Verification (CV, RS, AM), p. 1263–?.
ICALP-2001-SchroderMT- Amalgamation in CASL via Enriched Signatures (LS, TM, AT), pp. 993–1004.
DAC-2000-ChaudhryBPE #analysis- Current signature compression for IR-drop analysis (RC, DB, RP, TE), pp. 162–167.
ICPR-v2-2000-HuangY #using #verification- Signature Verification using Fractal Transformation (KH, HY), pp. 2851–2854.
ICPR-v2-2000-RibaCVJ #classification #invariant- Methods for Invariant Signature Classification (JRR, AC, SV, IJ), pp. 2953–2956.
ICPR-v3-2000-KoubaroulisMK #multimodal #performance- The Multimodal Signature Method: An Efficiency and Sensitivity Study (DK, JM, JK), pp. 3379–3382.
ICPR-v4-2000-HatteryCLG #embedded #migration- Optical Signatures of Small, Deeply Embedded, Tumor-Like Inclusions in Tissue-Like Turbid Media Based on a Random-Walk Theory of Photon Migration (DH, VC, MHL, AG), pp. 4348–4351.
ICPR-v4-2000-OhishiKM #online #using #verification- On-Line Signature Verification Using Pen-Position, Pen-Pressure and Pen-Inclination Trajectories (TO, YK, TM), pp. 4547–4550.
ICPR-v4-2000-YamanyF #3d #recognition #using- 3D Objects Coding and Recognition Using Surface Signatures (SMY, AAF), pp. 4571–4574.
KDD-2000-CortesFPR #data type #named- Hancock: a language for extracting signatures from data streams (CC, KF, DP, AR), pp. 9–17.
DATE-1999-NovakHK #analysis #on the- On Analog Signature Analysis (FN, BH, SK), p. 249–?.
DATE-1999-RayaneVN #detection #embedded- A One-Bit-Signature BIST for Embedded Operational Amplifiers in Mixed-Signal Circuits Based on the Slew-Rate Detection (IR, JVM, MN), p. 792–?.
ICDAR-1999-CordellaFSV #approach #documentation #multi #validation- Document Validation by Signature: A Serial Multi-Expert Approach (LPC, PF, CS, MV), pp. 601–604.
ICDAR-1999-FangWLTKTW #approach #verification- A Smoothness Index based Approach for Off-line Signature Verification (BF, YYW, CHL, YYT, PCKK, KWT, YKW), pp. 785–787.
ICDAR-1999-Hobby #classification #composition #geometry #layout- Page Decomposition and Signature Finding via Shape Classification and Geometric Layout (JDH), pp. 555–558.
ICDAR-1999-LecceDGIPSS #automation #verification- Selection of Reference Signatures for Automatic Signature Verification (VDL, GD, AG, SI, GP, AS, LS), pp. 597–600.
ICDAR-1999-MizukamiMYY #using #verification- An Off-line Signature Verification System using an Extraction Displacement Function (YM, HM, MY, IY), pp. 757–760.
PASTE-1999-Preston #fortran #legacy- New Type Signatures for Legacy Fortran Subroutines (NWP), pp. 76–85.
ICFP-1999-Shao- Transparent Modules with Fully Syntactic Signatures (ZS), pp. 220–232.
ICEIS-1999-FanCY- Blind Signatures with Double-Hashes Messages for Fair Electronic Elections and Ownership Claimable Digital Cash (CIF, WKC, YSY), pp. 612–618.
SAC-1999-KocberberC #information retrieval #multi #performance- Compressed Multi-Framed Signature Files: An Index Structure for Fast Information Retrieval (SK, FC), pp. 221–226.
DATE-1998-GhoshKBH #benchmark #equivalence #invariant #metric #synthesis- Synthesis of Wiring Signature-Invariant Equivalence Class Circuit Mutants and Applications to Benchmarking (DG, NK, FB, JEHI), pp. 656–663.
ICPR-1998-BouletreauVSE #identifier #question- Handwriting and signature: one or two personality identifiers? (VB, NV, RS, HE), pp. 1758–1760.
ICPR-1998-ChenHS #analysis #email- E-mail signature block analysis (HC, JH, RS), pp. 1153–1156.
ICPR-1998-DolfingAO #markov #modelling #online #verification- On-line signature verification with hidden Markov models (JGAD, EHLA, JJGMVO), pp. 1309–1312.
ICPR-1998-RigollK #comparison #markov #modelling #online #verification- A systematic comparison between on-line and off-line methods for signature verification with hidden Markov models (GR, AK), pp. 1755–1757.
ICPR-1998-ZhangFY98a #verification- Handwritten signature verification based on neural “gas” based vector quantization (BZ, MF, HY), pp. 1862–1864.
EDTC-1997-AbdullaRK #embedded #multi- A scheme for multiple on-chip signature checking for embedded SRAMs (MFA, CPR, AK), p. 625.
ICDAR-1997-KashiHNT #markov #online #using #verification- On-line Handwritten Signature Verification using Hidden Markov Model Features (RSK, JH, WLN, WT), pp. 253–257.
ICDAR-1997-MartensC #online #optimisation #programming- Dynamic Programming Optimisation for On-line Signature Verificatio (RM, LJMC), pp. 653–656.
ICDAR-1997-MartensC97a #online #verification- On-line Signature Verification: Discrimination Emphasised (RM, LJMC), pp. 657–660.
ICDAR-1997-SabourinDW #matrix #verification- Shape Matrices as a Mixed Shape Factor for Off-line Signature Verification (RS, JPD, ESW), pp. 661–666.
ICDAR-1997-SchmidtK #automation #personalisation #verification- Establishment of Personalized Templates for Automatic Signature Verification (CS, KFK), pp. 263–267.
ICDAR-1997-Wirtz #prototype #verification- Average prototypes for stroke-based signature verification (BW), pp. 268–272.
VLDB-1997-ChakrabartiDAR #database #navigation #taxonomy #using- Using Taxonomy, Discriminants, and Signatures for Navigating in Text Databases (SC, BD, RA, PR), pp. 446–455.
CIKM-1996-ShinKC #named #performance #query- S-signature: A New Scheme for Efficient Query Processing of Complex Objects in OODB (HS, KK, JWC), pp. 207–214.
ICPR-1996-Ben-ArieWR #invariant #recognition- Iconic recognition with affine-invariant spectral signatures (JBA, ZW, KRR), pp. 672–676.
ICPR-1996-Kimmel #difference #image- Affine differential signatures for gray level images of planar shapes (RK), pp. 45–49.
ICPR-1996-LeeL #verification- An off-line method for human signature verification (LLL, MGL), pp. 195–198.
ICPR-1996-LeeL96a #image- A lossless image compression method for human static signatures (LLL, MGL), pp. 910–913.
ICPR-1996-MartensC #online #verification- On-line signature verification by dynamic time-warping (RM, LJMC), pp. 38–42.
ICPR-1996-SabourinGP #verification- Pattern spectrum as a local shape factor for off-line signature verification (RS, GG, FJP), pp. 43–48.
ICPR-1996-TangLMLLS #approach #novel #recognition- A novel approach to optical character recognition based on ring-projection-wavelet-fractal signatures (YYT, BFL, HM, JL, CHL, CYS), pp. 325–329.
PLILP-1996-AponteC #morphism- Type Isomorphisms for Module Signatures (MVA, RDC), pp. 334–346.
POPL-1996-Jones #composition #using- Using Parameterized Signatures to Express Modular Structure (MPJ), pp. 68–78.
SAC-1996-HashemiSHL #identification #testing #using- Identifying and testing of signatures for non-volatile biomolecules using tandem mass spectra (RRH, TMS, WGH, JOL), pp. 44–49.
ICDAR-v1-1995-BaeF #automation #parallel #verification- Parallelism in dynamic time warping for automatic signature verification (YJB, MCF), pp. 426–429.
ICDAR-v1-1995-BauerW #automation #parametricity #personalisation #reduction #verification- Parameter reduction and personalized parameter selection for automatic signature verification (FB, BW), pp. 183–186.
ICDAR-v1-1995-HanS #identification- Signature identification via local association of features (KH, IKS), pp. 187–190.
ICDAR-v1-1995-LiangLY #query- False hits of tri-syllabic queries in a Chinese signature file (TL, SYL, WPY), pp. 159–162.
ICDAR-v1-1995-MurshedBS #approach #verification- Off-line signature verification, without a priori knowledge of class /spl omega//sub 2/. A new approach (NAM, FB, RS), pp. 191–196.
ICDAR-v1-1995-SabourinG #approach #classification #evaluation #multi #verification- An extended-shadow-code based approach for off-line signature verification. II. Evaluation of several multi-classifier combination strategies (RS, GG), pp. 197–201.
ICDAR-v1-1995-Wirtz #verification- Stroke-based time warping for signature verification (BW), pp. 179–182.
ICDAR-v1-1995-XiaoD #online #verification- A hierarchical on-line Chinese signature verification system (XHX, RWD), pp. 202–205.
ICDAR-v2-1995-DrouhardSG #case study #classification #comparative #nearest neighbour #network #using #verification- Comparative study of the k nearest neighbour, threshold and neural network classifiers for handwritten signature verification using an enhanced directional PDF (JPD, RS, MG), pp. 807–810.
ICDAR-v2-1995-KimPK #online #personalisation #set #verification- Applying personalized weights to a feature set for on-line signature verification (SHK, MSP, JK), pp. 882–885.
ICDAR-v2-1995-Lee #verification- Neural approaches for human signature verification (LLL), pp. 1055–1058.
ICDAR-v2-1995-TangMMLS #analysis #approach #documentation- A new approach to document analysis based on modified fractal signature (YYT, HM, XM, DL, CYS), pp. 567–570.
ICDAR-v2-1995-Ueda #using- Extraction of signature and seal imprint from bankchecks by using color information (KU), pp. 665–668.
CIKM-1995-KimC #information retrieval #parallel #performance- A New Parallel Signature File Method for Efficient Information Retrieval (JKK, JWC), pp. 66–73.
POPL-1995-Biswas #higher-order- Higher-Order Functors with Transparent Signatures (SKB), pp. 154–163.
EDAC-1994-Stroele #analysis- Signature Analysis for Sequential Circuits with Reset (APS), pp. 113–118.
LFP-1994-BiagioniHLM #ml #network #protocol #stack #standard- Signatures for a Network Protocol Stack: A Systems Application of Standard ML (EB, RH, PL, BM), pp. 55–64.
DAC-1993-McGeerSBS #logic #named- Espresso-Signature: A New Exact Minimizer for Logic Functions (PCM, JVS, RKB, ALSV), pp. 618–624.
ICDAR-1993-ChangWS #verification- Dynamic handwritten Chinese signature verification (HDC, JFW, HMS), pp. 258–261.
ICDAR-1993-GazzoloB #identification #realtime #recognition- Real time signature recognition: A method for personal identification (GG, LB), pp. 707–709.
ICDAR-1993-SabourinCG #approach #verification- An extended-shadow-code based approach for off-line signature verification (RS, MC, GG), pp. 1–5.
SIGMOD-1993-Guting #higher-order #modelling #optimisation #query #specification- Second-Order Signature: A Tool for Specifying Data Models, Query Processing, and Optimization (RHG), pp. 277–286.
SIGMOD-1993-IshikawaKO #evaluation #set- Evaluation of Signature Files as Set Access Facilities in OODBs (YI, HK, NO), pp. 247–256.
VLDB-1993-ZezulaCT #parallel- Hamming Filters: A Dynamic Signature File Organization for Parallel Stores (PZ, PC, PT), pp. 314–327.
SIGIR-1993-AktugC #analysis #multi #query- Analysis of Multiterm Queries in a Dynamic Signature File Organization (DA, FC), pp. 96–105.
FSE-1993-ZaremskiW #reuse- Signature Matching: A Key to Reuse (AMZ, JMW), pp. 182–190.
SIGIR-1992-GrandiTZ #parallel- Frame-Sliced Partitioned Parallel Signature Files (FG, PT, PZ), pp. 286–297.
POPL-1992-Tofte #higher-order- Principal Signatures for Higher-Order Program Modules (MT), pp. 189–199.
SIGIR-1991-Rabitti #image #multi #query- Image Query Processing Based on Multi-Level Signatures (FR, PS), pp. 305–314.
STOC-1990-Rompel- One-Way Functions are Necessary and Sufficient for Secure Signatures (JR), pp. 387–394.
SIGIR-1990-RabittiZ #database #multi- A Dynamic Signature Technique for Multimedia Databases (FR, PZ), pp. 193–210.
SIGIR-1990-Sacks-DavisW #analysis #documentation #retrieval #using- Using Syntactic Analysis in a Document Retrieval System that uses Signature Files (RSD, PW), pp. 179–192.
VLDB-1989-ChangS #database- A Signature Access Method for the Starburst Database System (WWC, HJS), pp. 145–153.
SIGIR-1989-ChangLL #clustering #data access #multi- Multikey Access Methods Based on Term Discrimination and Signature Clustering (JWC, JHL, YJL), pp. 176–185.
DAC-1987-TanTBVP #performance #self #simulation- A Fast Signature Simulation Tool for Built-In Self-Testing Circuits (SBT, KT, KB, PV, RP), pp. 17–25.
SIGIR-1986-Deppisch #named #retrieval- S-Tree: A Dynamic Balanced Signature Index for Office Retrieval (UD), pp. 77–87.
SIGMOD-1985-Faloutsos #comparison #design #performance- Signature files: Design and Performance Comparison of Some Signature Extraction Methods (CF), pp. 63–82.
VLDB-1985-FaloutsosC #design #query- Design of a Signature File Method that Accounts for Non-Uniform Occurrence and Query Frequencies (CF, SC), pp. 165–170.
STOC-1984-OngSS #equation #performance #polynomial- An Efficient Signature Scheme Based on Quadratic Equations (HO, CPS, AS), pp. 208–216.
STOC-1983-GoldwasserMY- Strong Signature Schemes (SG, SM, ACCY), pp. 431–439.
STOC-1982-Carter #formal method #testing- The Theory of Signature Testing for VLSI (JLC), pp. 66–76.
ICALP-1981-Lieberherr #complexity- Uniform Complexity and Digital Signatures (KJL), pp. 530–543.