The SCEAS System
Navigation Menu

Search the dblp DataBase


Dinei A. F. Florêncio: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dinei A. F. Florêncio, Patrice Simard
    Can the sample being transmitted be used to refine its own PDF estimate? [Citation Graph (0, 0)][DBLP]
    DCC, 2003, pp:233-242 [Conf]
  2. Dinei A. F. Florêncio, Ronald W. Schafer
    A Non-Expansive Pyramidal Morphological Image Coder. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 1994, pp:331-335 [Conf]
  3. Dinei A. F. Florêncio
    Image de-noising by selective filtering based on double-shot pictures. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2005, pp:353-356 [Conf]
  4. Dinei A. F. Florêncio, Cormac Herley
    Analysis and Improvement of Anti-Phishing Schemes. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:148-157 [Conf]
  5. Arlindo F. da Conceição, Jin Li, Dinei A. F. Florêncio
    Voice transmission over IEEE 802.11 networks: main issues and restrictions. [Citation Graph (0, 0)][DBLP]
    WebMedia, 2006, pp:233-242 [Conf]
  6. Ricardo L. de Queiroz, Dinei A. F. Florêncio, Ronald W. Schafer
    Nonexpansive pyramid for image coding using a nonlinear filterbank. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 1998, v:7, n:2, pp:246-252 [Journal]
  7. Dinei A. F. Florêncio, Cormac Herley
    KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:67-76 [Conf]
  8. Dinei A. F. Florêncio, Cormac Herley
    A large-scale study of web password habits. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:657-666 [Conf]

  9. Acoustic Echo Cancelation for High Noise Environments. [Citation Graph (, )][DBLP]

  10. PASS: Peer-Aware Silence Suppression for Internet Voice Conferences. [Citation Graph (, )][DBLP]

  11. Multi-Party Audio Conferencing Based on a Simpler MCU and Client-Side ECHO Cancellation. [Citation Graph (, )][DBLP]

  12. Enhanced MVDR Beamforming for Arrays of Directional Microphones. [Citation Graph (, )][DBLP]

  13. Personal 3D audio system with loudspeakers. [Citation Graph (, )][DBLP]

  14. Turning enemies into friends: Using reflections to improve sound source localization. [Citation Graph (, )][DBLP]

  15. One-Time Password Access to Any Server without Changing the Server. [Citation Graph (, )][DBLP]

  16. Protecting Financial Institutions from Brute-Force Attacks. [Citation Graph (, )][DBLP]

  17. Evaluating a trial deployment of password re-use for phishing prevention. [Citation Graph (, )][DBLP]

  18. Where do security policies come from? [Citation Graph (, )][DBLP]

  19. Why does PHAT work well in lownoise, reverberative environments? [Citation Graph (, )][DBLP]

  20. Multiview video compression and streaming based on predicted viewer position. [Citation Graph (, )][DBLP]

  21. Background recovery from video sequences using motion parameters. [Citation Graph (, )][DBLP]

  22. Maximum Likelihood Sound Source Localization for Multiple Directional Microphones. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002