A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results
[chapter]
2008
Lecture Notes in Computer Science
Off-line/On-line digital signatures were introduced by Even, Goldreich and Micali in [12]. In these signatures the signing process is divided in two parts. ...
The Shamir-Tauman idea is to construct off-line/on-line signatures as follows. The signer's public key is VK, like before, and pk. ...
This paper presents some theoretical and experimental results about off-line/on-line digital signatures. ...
doi:10.1007/978-3-540-78440-1_7
fatcat:fjlh72x6qvd47k253geexmvt2u
Off-Line Signature Verification using Novel Feature Extraction Techniques and Trajectory Recovery
2018
In this process, only the information that helps to identify the authenticity of questioned signatures is extracted and retained. ...
In total, three novel local features and four global features were proposed and investigated. ...
It is thus necessary to distinguish between three modes of operation for an automatic signature verification system: off-line, on-line, and hybrid. ...
doi:10.25904/1912/970
fatcat:ks6vcqgjmjc43geq3exgyckzgq
A versatile and low-cost 3D acquisition and processing pipeline for collecting mass of archaeological findings on the field
2015
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences
/on-line) portable database for associating descriptive attributes (archaeological description) to the 3D digitizations on site; <br><br> - a platform for data-gathering, archiving and sharing collections ...
automated solutions for collecting mass of archaeological findings, specially if one consider the real (and non theoretical) contextual aspects of a digitization campaign on the field (number of objects ...
accesses to the archaeological site and reserves. ...
doi:10.5194/isprsarchives-xl-5-w4-299-2015
fatcat:4djg7my5xzeaxiuymsl6rkk6qy
Rotor Fault Detection in Line-fed Induction Machines Using Complex Wavelet Analysis of Startup Transients
[chapter]
2010
Fault Detection
The experimental results shown in Fig. 10 and 13 used a wide range of values for a and b to better show the results of the method. ...
On-line methods do not stop the normal operation of the machine, while off-line methods require discontinuing the normal operation of the machine and often require moving it to a test rig. If they can ...
doi:10.5772/9073
fatcat:alu7scxjgzgw7oehac5kwofde4
Authenticating Computation on Groups: New Homomorphic Primitives and Applications
[chapter]
2014
Lecture Notes in Computer Science
As a second result, we show how to construct linearly homomorphic signature schemes to sign elements in bilinear groups (LHSG for short). ...
Next we give evidence that RMA secure LHSG are interesting on their own right by showing applications in the context of on-line/off-line homomorphic and network coding signatures. ...
Dario Catalano, Mario Di Raimondo, Dario Fiore, and Rosario Gennaro. Off-line/on-line signatures: Theoretical aspects and experimental results. ...
doi:10.1007/978-3-662-45608-8_11
fatcat:icmv3ywcrrh7dgxiivwbhf55gy
Tool wear condition monitoring in drilling operations using hidden Markov models (HMMs)
2001
International journal of machine tools & manufacture
Experimental results demonstrate the effectiveness of the proposed methods. ...
Kanai and Kanda [16] classified the various types of drill wear for large drills (of diameter Ն6 mm); these are illustrated in Fig. 2 in addition to chipping at the cutting lips (P T and P M ). ...
Acknowledgements The authors would like to thank John Gorse and Karl Ziegler from Eaton MTC for providing technical support and access to their laboratoy for the experimental part of our work. ...
doi:10.1016/s0890-6955(00)00112-7
fatcat:mgkofohqxfh3viysdx5npn5sli
A Conditional Random Field Framework for Robust and Scalable Audio-to-Score Matching
2011
IEEE Transactions on Audio, Speech, and Language Processing
Three types of features are used, characterizing the local harmony, note attacks and tempo. ...
Experiments run on a large database of classical piano and popular music exhibit very accurate alignments. ...
Depending on the targeted application, the alignment can be either on-line or off-line. ...
doi:10.1109/tasl.2011.2134092
fatcat:2h5x5adnbzhahbc72so2adjf2m
Apect-Based Opinion Extraction From Customer Reviews
2014
Computer Science & Information Technology ( CS & IT )
unpublished
Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work and industrial experiences describing significant advances in all areas ...
The goal of this conference series is to bring together researchers and practitioners from academia and industry to focus on understanding computer science and information technology and to establish new ...
Thanks to Elamin Altayeb and Abdallah Ulber for helping us revising the paper. ...
doi:10.5121/csit.2014.4413
fatcat:kln57k7f25dl3hx6ml43a7btfq
Mining Heterogeneous Urban Data at Multiple Granularity Layers
[article]
2018
(i) First, the automatic identification of the operational phases described above (OFF-line, ON-line transient and ON-line steady) is automatically performed. ...
Section 5.6 provides a theoretical and an analytical comparison between TCharM and four previous studies on clustering Twitter data. Section 5.7 discusses in depth the experimental results. ...
Hence, the spatial distance ( , ) between tweets and is computed as where ℎ = sin 2 (Δ /2) + cos 1 ⋅ cos 2 ⋅ sin 2 (Δ /2) and Δ and Δ are latitudinal and longitudinal differences between the tweets and ...
doi:10.6092/polito/porto/2709888
fatcat:cghqbdlcczcqnm74bdebwjix5e
Distributed Real-Time Databases
[chapter]
1991
Synchronization in Real-Time Systems
Classical off-line scheduling algorithms often require extensive amounts of infonnation to be available off-line. • On-line, announced. ...
Figure 4 . 4 : 44 Indeed, the experimental results from figure 4.3 show that the difference between OCC-Iight and 2PL gradually increases. ...
Algorithm C.l specifies the lock and unlock procedures for a single lock. Processes that requests locks send lock-requests to a so-caJled lock server, and wait for a return message, the lock-grant. ...
doi:10.1007/978-1-4615-4000-7_4
fatcat:za4jxrd6gfalhjgwzq2r5qg5em
Infant attention to phonetic detail in word forms : knowledge and familiarity effects
2004
These results are compatible with the limited resource explanation and discount the representational discontinuity argument by demonstrating that the relevant contrast is already present in words. ...
Because infants can discriminate the same phonetic detail that they fail to use in word-learning situations, the argument is that this word-learning failure results from a processing overload on cognitive ...
On-line scores were rounded to the nearest 0.1 s. Off-line scoring was also done to the nearest 0.1 s. ...
doi:10.14288/1.0091821
fatcat:s6gbsndswrc6nirrqxxndv3n7m
Dagstuhl Reports, Volume 7, Issue 10, October 2017, Complete Issue
[article]
2018
different factors and regression-like techniques. ...
Towards Performance Modeling and Performance Prediction across IR/RecSys/NLP We conclude by discussing how these explanatory models might be turned into predictive ones by using features describing these ...
Multi-temporal image unmixing and hyperspectral video unmixing are promising research issues, which can be tacked off-line, on-line or in a distributed manner. ...
doi:10.4230/dagrep.7.10
fatcat:l6tpayrw6veapbnmuxaxcrcxye
Constraint based methods for allocation and scheduling of periodic applications
2013
Results show that the approach can handle realistic instances in terms of size and complexity. Next, we tackle the Cyclic Resource-Constrained Scheduling Problem (i.e. CRCSP). ...
Many traditional approaches to cyclic scheduling operate by fixing the period value and then solving a linear problem in a generate-and-test fashion. ...
Other approaches combine off-line/on-line scheduling techniques. ...
doi:10.6092/unibo/amsdottorato/5503
fatcat:qhalac7d6ras7k4fhnjs3rxlba
The Cultural Significance of Web-Based Exchange Practices
2018
The daily practices of Web-based search and exchange thus reproduce and reinforce this cultural complex. ...
Initially, this argument is developed from a critical, hermeneutic, relativist and interpretive assessment that draws upon the works of authors such as Baudrillard and De Bord and other critiques of contemporary ...
"Unlike off-line, on-line communities are often constructed and destroyed not because they have challenges with structure…but because the connection is not time sensitive." (Costigan 1999, xxii) . ...
doi:10.25904/1912/2111
fatcat:lszk2pc3prdupkskeled4h5ifu
Viper : a visualisation tool for parallel program construction
[article]
1999
. • [off-line], [on-line]: indicates the working mode of Viper. ...
This type of simulation is also used lo optimise detector design, and in combination with cross checking experimental results, allows detector performance monitoring . ...
A loop iteration starts with reading the data stored in JOB into the variable RESULT. This data is then processed, and the variable RESULT is exposed. ...
doi:10.6100/ir526980
fatcat:xrwmke754rewbg227ryg2v2rwq
« Previous
Showing results 1 — 15 out of 16 results