Sciweavers

8825 search results - page 43 / 1765
» All for one or one for all
Sort
View

Publication
138views
12 years 3 months ago
Vision Models for Image Quality Assessment: One is Not Enough
A number of image quality metrics are based on psychophysical models of the human visual system. We propose a new framework for image quality assessment, gathering three indexes de...
Roland Brémond, Jean-Philippe Tarel, Eric Dumont...
CCS
2011
ACM
12 years 7 months ago
Forensic investigation of the OneSwarm anonymous filesharing system
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate se...
Swagatika Prusty, Brian Neil Levine, Marc Liberato...
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
13 years 11 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
PR
2006
127views more  PR 2006»
13 years 7 months ago
On solving the face recognition problem with one training sample per subject
The lack of adequate training samples and the considerable variations observed in the available image collections due to aging, illumination and pose variations are the two key te...
Jie Wang, Kostas N. Plataniotis, Juwei Lu, Anastas...
SPW
2004
Springer
14 years 1 months ago
One User, Many Hats; and, Sometimes, No Hat: Towards a Secure Yet Usable PDA
How can we design a PDA that is at the same time secure and usable? In current implementations the two properties are mutually exclusive. Because normal users find password entry ...
Frank Stajano