Sciweavers

903 search results - page 47 / 181
» Usability inspection methods
Sort
View
IDTRUST
2009
ACM
15 years 4 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
JUCS
2008
147views more  JUCS 2008»
14 years 10 months ago
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
Abstract: ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a V...
Martin Petraschek, Thomas Hoeher, Oliver Jung, Hel...
PRL
2006
93views more  PRL 2006»
14 years 10 months ago
ROC curves and video analysis optimization in intestinal capsule endoscopy
Wireless capsule endoscopy involves inspection of hours of video material by a highly qualified professional. Time episodes corresponding to intestinal contractions, which are of ...
Fernando Vilariño, Ludmila I. Kuncheva, Pet...
81
Voted
JEI
2008
128views more  JEI 2008»
14 years 9 months ago
Practical use of receiver operating characteristic analysis to assess the performances of defect detection algorithms
Defect detection in images is a current task in quality control and is often integrated in partially or fully automated systems. Assessing the performances of defect detection algo...
Yann Le Meur, Jean-Michel Vignolle, Jocelyn Chanus...
ICRA
2010
IEEE
199views Robotics» more  ICRA 2010»
14 years 8 months ago
3-D shape measurement of pipe by range finder constructed with omni-directional laser and omni-directional camera
— A lot of plumbings such as gas pipes and water pipes exist in public utilities, factories, power plants and so on. It is difficult for humans to inspect them directly because t...
Kenki Matsui, Atsushi Yamashita, Toru Kaneko