Sciweavers

2015 search results - page 74 / 403
» Some Observations on Indifferentiability
Sort
View
86
Voted
SPW
2004
Springer
15 years 6 months ago
Authentication Components: Engineering Experiences and Guidelines
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...
Pasi Eronen, Jari Arkko
97
Voted
ICASSP
2010
IEEE
15 years 27 days ago
Fundamental limits of image denoising: Are we there yet?
In this paper, we study the fundamental performance limits of image denoising where the aim is to recover the original image from its noisy observation. Our study is based on a ge...
Priyam Chatterjee, Peyman Milanfar
115
Voted
IJCV
2002
240views more  IJCV 2002»
15 years 14 days ago
Self-Calibration of Rotating and Zooming Cameras
In this paper we describe the theory and practice of self-calibration of cameras which are fixed in location and may freely rotate while changing their internal parameters by zoomi...
Lourdes de Agapito, Eric Hayman, Ian D. Reid
80
Voted
MSN
2005
Springer
15 years 6 months ago
Handling Sensed Data in Hostile Environments
Systems that track sensed data trigger alerts based on the evaluation of some condition. In the presence of loss data a conservative condition may not generate a necessary alert an...
Oren Ben-Zwi, Shlomit S. Pinter
99
Voted
SEE
1989
Springer
15 years 4 months ago
Tool Integration in Software Engineering Environments
This article presents doctoral research on tool integration within software engineering environments. Tool integration concerns the techniques used to form coalitions of tools tha...
Anthony I. Wasserman