نتایج جستجو برای: fingerprinting techniques

تعداد نتایج: 636550  

Journal: :IEICE Electronic Express 2013
Tingyuan Nie Jie Sun Aiguo Ji Zhe-Ming Lu

The continuously widening design productivity gap in the past few decades gives high incentives to counterfeiting ICs. Existing intellectual property (IP) protection schemes demand high overheads, and some techniques like watermarking do not facilitate tracing of illegal users. In this letter,we propose a novel fingerprinting method based on post-processing on circuit partitions. We evaluate ou...

2011
L. K. Medlin

1. The Importance of Biodiversity Research in the Marine Environment 2. What Questions can be Answered Using Molecular Biology Techniques? 3. Evaluating Marine Biodiversity by Sequence Analysis and Fingerprinting Methods 3.1. Sequence Analysis 3.1.1. Which Genes to Select? 3.1.2. How to Generate Sequence Data? 3.1.3. Determining Biodiversity in an Environmental Sample by Sequence Analysis 3.1.4...

2009
Sylvie MAYRARGUE Sylvie Mayrargue Benoît Denis Christian Mensing Ronald Raulefs Stephan Sand Mohamed Laaraiedh Joaquim Bastos Stavros Stavrou Marios Raspopoulos Konstantinos Papakonstantinou

This deliverable presents a literature survey of localisation in communication networks. In a first part, use of communication networks for location estimation is presented. Two families of methods do exist: fingerprinting and geometrical techniques. Cooperative positioning is one possible enhancement. In a second part, use of location information to improve radio resource management, specifica...

2002
Pedro Cano Eloi Batlle Ton Kalker Jaap Haitsma

AbsfracfAn audio fingerprint is a content-based compact signature that summarizes an audio recording. Audio Fingerprinting technologies have recently attracted attention since they allow the monitoring of audio independently of its format and without the need of meta-data or watermark embedding. The different approaches to fingerprinting are usually described with different rationales and termi...

2009
Chi Wan Jeon Ho Chul Song Chi Wan

Crude oil spilled from the Herbaysprit in Oecember 2007 and contaminated Tae Ann Sound shoreline. A weathered oiled sediment collected at the spill area (Tai Ann beach) from 3 months to 12 months after the spil l. The fingerprinting and data interpretation techniques oil spill characterization and identification studies and environmental investigations discussed indude oil spill identification ...

Journal: :Bioinformatics 2007
Frank M. You Ming-Cheng Luo Yong Qiang Gu Gerard R. Lazo Karin Deal Jan Dvorak Olin D. Anderson

UNLABELLED High-throughput content fingerprinting techniques employing capillary electrophoresis place new demands on the editing of fingerprint files for the downstream contig assembly program, FPC. A cross-platform software application, GenoProfiler, was developed for automated editing of sized fingerprinting profiles generated by the ABI Genetic Analyzers. The batch-processing module extract...

2009
Ting-Fang Yen Xin Huang Fabian Monrose Michael K. Reiter

We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and from that host. Our techniques utilize connection records containing only the source and destination addresses and ports, packet and byte counts, and the start and end times of each connection. We additionally provide ...

2010
Julius Schwartzenberg

TCP/IP fingerprinting is the active or passive collection of information usually extracted from a remote computer’s network stack. The combination of such information can be then used to infer the remote operating system (OS fingerprinting). OS fingerprinting is traditionally based on a database of “signatures”. A signature comprises several features (i.e., pairs attribute/value) extracted from...

2013
Luca Baroffio Matteo Cesana Alessandro Redondi Marco Tagliasacchi

A robust hash, or content-based fingerprint, is a succinct representation of the perceptually most relevant parts of a multimedia object. A key requirement of fingerprinting is that elements with perceptually similar content should map to the same fingerprint, even if their bit-level representations are different. In this work we focus on the construction of discriminative binary local descript...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید