Fingerprints fixed

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fingerprints Theorems

We prove that the scale map of the .zero-crossings of almost all signals filtered by a gaussian of variable size determines the signal uniquely, up to a constant scaling. Exceptions are signals that are antisymmetric about all their zeros (for instance infinitely periodic gratings). Our proof provides a method for reconstructing almost all signals from knowledge of how the zero-crossing contour...

متن کامل

Diffusion Fingerprints

We introduce a new method for classifying and clustering data exhibiting associative properties. By means of graph theoretical tools, we show how to generate diffusion fingerprints for each subset of the data collection. We then propose a simple and computationally efficient technique for dimensionality reduction. Throughout this paper, we apply our method to the problem of classifying a corpus...

متن کامل

Quantum Fingerprints

The one thing everyone knows about quantum mechanics is its legendary weirdness, in which the basic tenets of the world it describes seem alien to the world we live in. Superposition, where things can be in two states simultaneously, a switch both on and off, a cat both dead and alive. Or entanglement, what Einstein called "spooky action-at-distance" in which objects are invisibly linked, even ...

متن کامل

Cognitive Fingerprints

Ever since “True Names” by Vernor Vinge, identity has been recognized as our most valued possession in cyberspace. Attribution is a key concept in enabling trusted identities and deterring malicious activities. The rash of recent cyber-attacks targeting consumers, coupled with the massive amount of available digital data, has forced us to rethink our very notion of authentication as a one-shot ...

متن کامل

Weighted Method Signatures Fingerprints

A software fingerprint is a set of distinctive characteristics used to identify and compare programs. This paper presents a fingerprint technique based on the characteristics of method signatures. The proposed technique considers uncommon method signatures as being more effective than common ones to compare programs. The implementation of this technique is limited to Java programs, but it could...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nature Chemistry

سال: 2008

ISSN: 1755-4330,1755-4349

DOI: 10.1038/nchem.84