Sciweavers

12194 search results - page 77 / 2439
» cans 2010
Sort
View
MEDIAFORENSICS
2010
13 years 10 months ago
Digital image authentication from thumbnails
We describe how to exploit the formation and storage of an embedded image thumbnail for image authentication. The creation of a thumbnail is modeled with a series of filtering ope...
Eric Kee, Hany Farid
SNPD
2010
13 years 10 months ago
Explaining Classification by Finding Response-Related Subgroups in Data
Abstract--A method for explaining results of a regressionbased classifier is proposed. The data is clustered using a metric extracted from the classifier. This way, clusters found ...
Elina Parviainen, Aki Vehtari
CMS
2010
118views Communications» more  CMS 2010»
13 years 9 months ago
SIP Proxies: New Reflectors in the Internet
To mitigate identity theft in SIP networks, an inter-domain authentication mechanism based on certificates is proposed in RFC 4474 [10]. Unfortunately, the design of the certificat...
Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi, Simo...
AIR
2010
97views more  AIR 2010»
13 years 9 months ago
A unified framework for improving the accuracy of all holistic face identification algorithms
Abstract Reconstructing the challenging human face identification process as a stability problem, we show that Electoral College can be used as a framework that provides a signific...
Liang Chen, Naoyuki Tokuda
AML
2010
91views more  AML 2010»
13 years 9 months ago
The limitations of cupping in the local structure of the enumeration degrees
Abstract We prove that a sequence of sets containing representatives of cupping partners for every nonzero 0 2 enumeration degree cannot have a 0 2 enumeration. We also prove that ...
Mariya Ivanova Soskova