Sciweavers

12194 search results - page 77 / 2439
» cans 2010
Sort
View
99
Voted
MEDIAFORENSICS
2010
15 years 2 months ago
Digital image authentication from thumbnails
We describe how to exploit the formation and storage of an embedded image thumbnail for image authentication. The creation of a thumbnail is modeled with a series of filtering ope...
Eric Kee, Hany Farid
SNPD
2010
15 years 2 months ago
Explaining Classification by Finding Response-Related Subgroups in Data
Abstract--A method for explaining results of a regressionbased classifier is proposed. The data is clustered using a metric extracted from the classifier. This way, clusters found ...
Elina Parviainen, Aki Vehtari
85
Voted
CMS
2010
118views Communications» more  CMS 2010»
15 years 1 months ago
SIP Proxies: New Reflectors in the Internet
To mitigate identity theft in SIP networks, an inter-domain authentication mechanism based on certificates is proposed in RFC 4474 [10]. Unfortunately, the design of the certificat...
Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi, Simo...
85
Voted
AIR
2010
97views more  AIR 2010»
15 years 1 months ago
A unified framework for improving the accuracy of all holistic face identification algorithms
Abstract Reconstructing the challenging human face identification process as a stability problem, we show that Electoral College can be used as a framework that provides a signific...
Liang Chen, Naoyuki Tokuda
90
Voted
AML
2010
91views more  AML 2010»
15 years 1 months ago
The limitations of cupping in the local structure of the enumeration degrees
Abstract We prove that a sequence of sets containing representatives of cupping partners for every nonzero 0 2 enumeration degree cannot have a 0 2 enumeration. We also prove that ...
Mariya Ivanova Soskova