Journal articles on the topic 'SIGNATURE FILES'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'SIGNATURE FILES.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Faloutsos, Chris. "Signature files." ACM SIGMOD Record 14, no. 4 (May 1985): 63–82. http://dx.doi.org/10.1145/971699.318903.
Full textChen, Yangjun. "Signature files and signature trees." Information Processing Letters 82, no. 4 (May 2002): 213–21. http://dx.doi.org/10.1016/s0020-0190(01)00266-6.
Full textLi, Tong, Wenbin Chen, Yi Tang, and Hongyang Yan. "A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT." Security and Communication Networks 2018 (June 14, 2018): 1–6. http://dx.doi.org/10.1155/2018/9641273.
Full textLin, Z., and C. Faloutsos. "Frame-sliced signature files." IEEE Transactions on Knowledge and Data Engineering 4, no. 3 (June 1992): 281–89. http://dx.doi.org/10.1109/69.142018.
Full textLin, Zheng. "Concurrent frame signature files." Distributed and Parallel Databases 1, no. 3 (July 1993): 231–49. http://dx.doi.org/10.1007/bf01263332.
Full textMoshood Abiola, Alogba, and Mohd Fadzli Marhusin. "Signature-Based Malware Detection Using Sequences of N-grams." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 120. http://dx.doi.org/10.14419/ijet.v7i4.15.21432.
Full textZobel, Justin, Alistair Moffat, and Kotagiri Ramamohanarao. "Inverted files versus signature files for text indexing." ACM Transactions on Database Systems 23, no. 4 (December 1998): 453–90. http://dx.doi.org/10.1145/296854.277632.
Full textZezula, P., F. Rabitti, and P. Tiberio. "Dynamic partitioning of signature files." ACM Transactions on Information Systems 9, no. 4 (October 1991): 336–67. http://dx.doi.org/10.1145/119311.119313.
Full textGrandi, Fabio. "On the signature weight in “multiple” m signature files." ACM SIGIR Forum 29, no. 1 (March 21, 1995): 20–25. http://dx.doi.org/10.1145/207556.207560.
Full textBastian, Alvian. "Improving Antivirus Signature For Detection Ransomware Attacks With Machine Learning." Smart Comp :Jurnalnya Orang Pintar Komputer 10, no. 1 (January 20, 2021): 30–34. http://dx.doi.org/10.30591/smartcomp.v10i1.2190.
Full textRizal, Randi, Ruuhwan Ruuhwan, and Septian Chandra. "Signature File Analysis Using The National Institute Standard Technology Method Base on Digital Forensic Concepts." Jurnal Informatika Universitas Pamulang 5, no. 3 (September 30, 2020): 364. http://dx.doi.org/10.32493/informatika.v5i3.6073.
Full textTiberio, Paolo, and Pavel Zezula. "Selecting signature files for specific applications." Information Processing & Management 29, no. 4 (July 1993): 487–98. http://dx.doi.org/10.1016/0306-4573(93)90044-e.
Full textCarterette, Ben, and Fazli Can. "Comparing inverted files and signature files for searching a large lexicon." Information Processing & Management 41, no. 3 (May 2005): 613–33. http://dx.doi.org/10.1016/j.ipm.2003.12.003.
Full textFarjamfar, Aanahita, Mohd Taufik Abdullah, Ramlan Mahmod, and Nur Izura Udzir. "Multimedia Files Signature Analysis in Blackberry Z10." Journal of Applied Sciences 15, no. 4 (March 15, 2015): 668–74. http://dx.doi.org/10.3923/jas.2015.668.674.
Full textLee, Dik Kun, and Liming Ren. "Document ranking on weight-partitioned signature files." ACM Transactions on Information Systems 14, no. 2 (April 1996): 109–37. http://dx.doi.org/10.1145/226163.226164.
Full textCiaccia, Paolo, Paolo Tiberio, and Pavel Zezula. "Declustering of key-based partitioned signature files." ACM Transactions on Database Systems 21, no. 3 (September 1996): 295–338. http://dx.doi.org/10.1145/232753.232755.
Full textVinod, P., Vijay Laxmi, Manoj Singh Gaur, and Grijesh Chauhan. "Detecting malicious files using non-signature-based methods." International Journal of Information and Computer Security 6, no. 3 (2014): 199. http://dx.doi.org/10.1504/ijics.2014.066646.
Full textYing, Zhongwen, and Thomas G. Robertazzi. "Signature Searching in a Networked Collection of Files." IEEE Transactions on Parallel and Distributed Systems 25, no. 5 (May 2014): 1339–48. http://dx.doi.org/10.1109/tpds.2013.258.
Full textShan, Man-Kwan, and Suh-Yin Lee. "Dynamic allocation of Signature Files on Parallel devices." Information Systems 23, no. 7 (November 1998): 489–508. http://dx.doi.org/10.1016/s0306-4379(98)00024-6.
Full textIm, Byoung-Mo, Myoung Ho Kim, Hyung-Il Kang, and Jae Soo Yoo. "Declustering signature files based on a dynamic measure." Information Processing Letters 74, no. 5-6 (June 2000): 235–41. http://dx.doi.org/10.1016/s0020-0190(00)00059-4.
Full textLee, Dik Lun, and Chun-Wu Leng. "Partitioned signature files: design issues and performance evaluation." ACM Transactions on Information Systems 7, no. 2 (April 1989): 158–80. http://dx.doi.org/10.1145/65935.65937.
Full textLiu, Lei, and Dai Ping Li. "Analysis Based on of Android Malicious Code Intrusion Detection." Advanced Materials Research 756-759 (September 2013): 3924–28. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.3924.
Full textGayoso Martínez, Víctor, Fernando Hernández-Álvarez, and Luis Hernández Encinas. "An Improved Bytewise Approximate Matching Algorithm Suitable for Files of Dissimilar Sizes." Mathematics 8, no. 4 (April 2, 2020): 503. http://dx.doi.org/10.3390/math8040503.
Full textDervos, D., Y. Manolopoulos, and P. Linardis. "Ranking the validity of block candidacies in signature files." Information Sciences 79, no. 1-2 (July 1994): 89–108. http://dx.doi.org/10.1016/0020-0255(94)90041-8.
Full textKim, Jeong-Ki, and Jae-Woo Chang. "Horizontally divided signature files on a parallel machine architecture." Journal of Systems Architecture 44, no. 9-10 (June 1998): 723–35. http://dx.doi.org/10.1016/s1383-7621(97)00015-5.
Full textKocberber, Seyit, and Fazli Can. "Partial evaluation of queries for bit-sliced signature files." Information Processing Letters 60, no. 6 (December 1996): 305–11. http://dx.doi.org/10.1016/s0020-0190(96)00176-7.
Full textEl Mane, Adil, Younes Chihab, and Redouan Korchiyne. "Digital Signature for data and documents using operating PKI certificates." SHS Web of Conferences 119 (2021): 07004. http://dx.doi.org/10.1051/shsconf/202111907004.
Full textYamakawa, Yoshihiro, Masao Fuketa, Kazuhiro Morita, and Jun-ichi Aoe. "A method for improving full text search using signature files." International Journal of Computer Mathematics 77, no. 1 (January 2001): 73–88. http://dx.doi.org/10.1080/00207160108805051.
Full textIshikawa, Yoshiharu, Hiroyuki Kitagawa, and Nobuo Ohbo. "Evaluation of signature files as set access facilities in OODBs." ACM SIGMOD Record 22, no. 2 (June 1993): 247–56. http://dx.doi.org/10.1145/170036.170076.
Full textMagnini, Vincent P., and Earl D. Honeycutt. "Use of E-Mail Signature Files in the Hotel Industry." Cornell Hospitality Quarterly 50, no. 4 (July 24, 2009): 510–19. http://dx.doi.org/10.1177/1938965509340769.
Full textIM, Byoung-Mo, Myoung Ho Kim, Jae Soo Yoo, and Kil Seong Choi. "Dynamic construction of signature files based on frame sliced approach." Data & Knowledge Engineering 30, no. 2 (June 1999): 101–20. http://dx.doi.org/10.1016/s0169-023x(99)00006-3.
Full textBozanis, P., C. Makris, and A. Tsakalidis. "Parametric Weighted Filter: An Efficient Dynamic Manipulation of Signature Files." Computer Journal 38, no. 6 (January 1, 1995): 479–88. http://dx.doi.org/10.1093/comjnl/38.6.479.
Full textWoo Chang, Jae, and Yoon Joon Lee. "Design and evaluation of multikey access methods using signature files." Microprocessing and Microprogramming 33, no. 1 (September 1991): 9–19. http://dx.doi.org/10.1016/0165-6074(91)90011-h.
Full textAn, Hai Ning, and Zi Yu Cheng. "Design of E-Archives Portfolio System Based on Signature Technology." Applied Mechanics and Materials 519-520 (February 2014): 32–35. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.32.
Full textJung, Dong-Seob, Sang-Joon Lee, and Ieck-Chae Euom. "ImageDetox: Method for the Neutralization of Malicious Code Hidden in Image Files." Symmetry 12, no. 10 (September 30, 2020): 1621. http://dx.doi.org/10.3390/sym12101621.
Full textLiu, Gang, Yan Xiang Lou, and Sheng Li Liu. "Data Integrity Check and Repair in Design and Manufacture of Distributed Storage Network." Advanced Materials Research 548 (July 2012): 753–57. http://dx.doi.org/10.4028/www.scientific.net/amr.548.753.
Full textYAMAJI, Kazutsuna, Toshiyuki KATAOKA, Naoto MIYACHI, and Noboru SONEHARA. "Application of the Long Term Signature to Office Open XML files." Joho Chishiki Gakkaishi 20, no. 1 (2010): 1–14. http://dx.doi.org/10.2964/jsik.19-300.
Full textKocberbera, Seyit, and Fazli Can. "Vertical framing of superimposed signature files using partial evaluation of queries." Information Processing & Management 33, no. 3 (May 1997): 353–76. http://dx.doi.org/10.1016/s0306-4573(96)00073-8.
Full textNoroozi, Erfaneh, Salwani Bt Mohd Daud, Ali Sabouhi, and Mohammad Reza Salehnamadi. "New Algorithm to Reduce File Size and Bandwidth of Hashed Digital Signature for Image Steganography Using LSB." Advanced Materials Research 980 (June 2014): 194–97. http://dx.doi.org/10.4028/www.scientific.net/amr.980.194.
Full textMachut-Kowalczyk, Joanna. "Między krzyżykiem a kółkiem. Niepiśmienny w aktach wydziału pojednawczego i policji prostej sądu pokoju w Zgierzu i Łodzi z lat 1844–1876." Krakowskie Studia z Historii Państwa i Prawa 14, no. 1 (2021): 1–15. http://dx.doi.org/10.4467/20844131ks.21.001.13268.
Full textKok, S., Azween Abdullah, NZ Jhanjhi, and Mahadevan Supramaniam. "Prevention of Crypto-Ransomware Using a Pre-Encryption Detection Algorithm." Computers 8, no. 4 (November 1, 2019): 79. http://dx.doi.org/10.3390/computers8040079.
Full textWeng, Wen Yong, Jian Su, Xiao Jie Yang, and Zhe Bing Wang. "Offline Data Sharing Model Based on Encrypted XML Files." Advanced Materials Research 488-489 (March 2012): 1574–81. http://dx.doi.org/10.4028/www.scientific.net/amr.488-489.1574.
Full textLiu, Yong Qing, and Jin Ding Cai. "Study on Collaborative Design for Distribution Engineering Based on CAD and Knowledge Management." Applied Mechanics and Materials 241-244 (December 2012): 2133–38. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2133.
Full textAzhan, Nor Amira Nor, Richard Adeyemi Ikuesan, Shukor Abd Razak, and Victor R. Kebande. "Error Level Analysis Technique for Identifying JPEG Block Unique Signature for Digital Forensic Analysis." Electronics 11, no. 9 (May 3, 2022): 1468. http://dx.doi.org/10.3390/electronics11091468.
Full textAl-Qaisi, Aws, Saleh A. Khawatreh, Ahmad A. Sharadqah, and Ziad A. Alqadi. "Wave File Features Extraction using Reduced LBP." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 2780. http://dx.doi.org/10.11591/ijece.v8i5.pp2780-2787.
Full textQiu, Jing, Xiaoxu Geng, and Guanglu Sun. "Compressed Firmware Classification Based on Extra Trees and Doc2Vec." Scientific Programming 2021 (December 22, 2021): 1–9. http://dx.doi.org/10.1155/2021/2666153.
Full textKang, Peng, Wenzhong Yang, and Jiong Zheng. "Blockchain Private File Storage-Sharing Method Based on IPFS." Sensors 22, no. 14 (July 7, 2022): 5100. http://dx.doi.org/10.3390/s22145100.
Full textYadav, Arun Kumar, Divakar Yadav, and Rajesh Prasad. "Efficient Textual Web Retrieval using Wavelet Tree." International Journal of Information Retrieval Research 6, no. 4 (October 2016): 16–29. http://dx.doi.org/10.4018/ijirr.2016100102.
Full textChen, Long, and Xiao Yin Yi. "A Flexible Authentication Scheme with Supporting Multiple Granularity of Data Integrity." Applied Mechanics and Materials 536-537 (April 2014): 489–93. http://dx.doi.org/10.4028/www.scientific.net/amm.536-537.489.
Full textYe, Ning, Hengfu Yin, Jingjing Liu, Xiaogang Dai, and Tongming Yin. "GESearch: An Interactive GUI Tool for Identifying Gene Expression Signature." BioMed Research International 2015 (2015): 1–8. http://dx.doi.org/10.1155/2015/853734.
Full text