Sciweavers

8825 search results - page 43 / 1765
» All for one or one for all
Sort
View
385
Voted

Publication
138views
13 years 8 months ago
Vision Models for Image Quality Assessment: One is Not Enough
A number of image quality metrics are based on psychophysical models of the human visual system. We propose a new framework for image quality assessment, gathering three indexes de...
Roland Brémond, Jean-Philippe Tarel, Eric Dumont...
129
Voted
CCS
2011
ACM
14 years 23 days ago
Forensic investigation of the OneSwarm anonymous filesharing system
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate se...
Swagatika Prusty, Brian Neil Levine, Marc Liberato...
114
Voted
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
15 years 4 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
PR
2006
127views more  PR 2006»
15 years 22 days ago
On solving the face recognition problem with one training sample per subject
The lack of adequate training samples and the considerable variations observed in the available image collections due to aging, illumination and pose variations are the two key te...
Jie Wang, Kostas N. Plataniotis, Juwei Lu, Anastas...
137
Voted
SPW
2004
Springer
15 years 6 months ago
One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA
How can we design a PDA that is at the same time secure and usable? In current implementations the two properties are mutually exclusive. Because normal users find password entry ...
Frank Stajano