The SCEAS System
Navigation Menu

Search the dblp DataBase


Cormac Herley: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ping Wah Wong, Nader Moayeri, Cormac Herley
    Optimum Pre- and Post Filters for Robust Scalar Quantization. [Citation Graph (0, 0)][DBLP]
    Data Compression Conference, 1996, pp:240-249 [Conf]
  2. Cormac Herley
    Securing Images Online: A Protection Mechanism That Does Not Involve Watermarking. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  3. Cormac Herley
    Document capture using a digital camera. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2001, pp:1041-1044 [Conf]
  4. Cormac Herley
    Recursive method to extract rectangular objects from scans. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 2003, pp:989-992 [Conf]
  5. Cormac Herley
    Efficient inscribing of noisy rectangular objects in scanned images. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:2399-2402 [Conf]
  6. Cormac Herley
    A Post-Processing Algorithm for Compressed Digital Camera Images. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 1998, pp:396-400 [Conf]
  7. Cormac Herley
    Storage of Digital Camera Images. [Citation Graph (0, 0)][DBLP]
    ICIP (3), 1999, pp:940-942 [Conf]
  8. Cormac Herley, Poorvi L. Vora, Shawn Yang
    Detection and deterrence of counterfeiting of valuable documents. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:2423-2426 [Conf]
  9. Poorvi L. Vora, Cormac Herley
    Trade-offs between Color Saturation and Noise Sensitivity in Image Sensors. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 1998, pp:196-200 [Conf]
  10. Ping Wah Wong, Cormac Herley
    Area-Based Interpolation For Scaling of Images From a CCD. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 1997, pp:905-908 [Conf]
  11. Zixiang Xiong, Cormac Herley, Kannan Ramchandran, Michael T. Orchard
    Space-frequency quantization for a space-varying wavelet packet image coder. [Citation Graph (0, 0)][DBLP]
    ICIP, 1995, pp:614-617 [Conf]
  12. Cormac Herley
    Automatic occlusion removal from minimum number of images. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2005, pp:1046-1049 [Conf]
  13. Cormac Herley
    Multirate Operations for Exact Interpolation and Iterative Subdivision Schemes. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1994, pp:169-172 [Conf]
  14. Cormac Herley
    Boundary Filters for Finite-Length Signals and Time-Varying Filter Banks. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1994, pp:637-640 [Conf]
  15. Cormac Herley, Martin Vetterli
    Orthogonal time-varying filter banks and wavelets. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1993, pp:391-394 [Conf]
  16. Cormac Herley
    Accurate repeat finding and object skipping using fingerprints. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2005, pp:656-665 [Conf]
  17. Dinei A. F. Florêncio, Cormac Herley
    Analysis and Improvement of Anti-Phishing Schemes. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:148-157 [Conf]
  18. Ashwin R. Bharambe, Cormac Herley, Venkata N. Padmanabhan
    Some observations on bitTorrent performance. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2005, pp:398-399 [Conf]
  19. Cormac Herley, Zixiang Xiong, Kannan Ramchandran, Michael T. Orchard
    Joint space-frequency segmentation using balanced wavelet packet trees for least-cost image representation. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 1997, v:6, n:9, pp:1213-1230 [Journal]
  20. Cormac Herley, Ping Wah Wong
    Minimum rate sampling and reconstruction of signals with arbitrary frequency support. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:5, pp:1555-1564 [Journal]
  21. Cormac Herley
    ARGOS: automatically extracting repeating objects from multimedia streams. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2006, v:8, n:1, pp:115-129 [Journal]
  22. Dinei A. F. Florêncio, Cormac Herley
    KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:67-76 [Conf]
  23. Ashwin R. Bharambe, Cormac Herley, Venkata N. Padmanabhan
    Analyzing and Improving a BitTorrent Networks Performance Mechanisms. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  24. Robert Ragno, Christopher J. C. Burges, Cormac Herley
    Inferring similarity between music objects with application to playlist generation. [Citation Graph (0, 0)][DBLP]
    Multimedia Information Retrieval, 2005, pp:73-80 [Conf]
  25. Dinei A. F. Florêncio, Cormac Herley
    A large-scale study of web password habits. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:657-666 [Conf]

  26. Passwords: If We're So Smart, Why Are We Still Using Them? [Citation Graph (, )][DBLP]

  27. One-Time Password Access to Any Server without Changing the Server. [Citation Graph (, )][DBLP]

  28. Can "Something You Know" Be Saved?. [Citation Graph (, )][DBLP]

  29. A robust link-translating proxy server mirroring the whole web. [Citation Graph (, )][DBLP]

  30. Protecting Financial Institutions from Brute-Force Attacks. [Citation Graph (, )][DBLP]

  31. Evaluating a trial deployment of password re-use for phishing prevention. [Citation Graph (, )][DBLP]

  32. Where do security policies come from? [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002