Search the dblp DataBase
Cormac Herley :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ping Wah Wong , Nader Moayeri , Cormac Herley Optimum Pre- and Post Filters for Robust Scalar Quantization. [Citation Graph (0, 0)][DBLP ] Data Compression Conference, 1996, pp:240-249 [Conf ] Cormac Herley Securing Images Online: A Protection Mechanism That Does Not Involve Watermarking. [Citation Graph (0, 0)][DBLP ] ICIP, 2000, pp:- [Conf ] Cormac Herley Document capture using a digital camera. [Citation Graph (0, 0)][DBLP ] ICIP (2), 2001, pp:1041-1044 [Conf ] Cormac Herley Recursive method to extract rectangular objects from scans. [Citation Graph (0, 0)][DBLP ] ICIP (3), 2003, pp:989-992 [Conf ] Cormac Herley Efficient inscribing of noisy rectangular objects in scanned images. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:2399-2402 [Conf ] Cormac Herley A Post-Processing Algorithm for Compressed Digital Camera Images. [Citation Graph (0, 0)][DBLP ] ICIP (1), 1998, pp:396-400 [Conf ] Cormac Herley Storage of Digital Camera Images. [Citation Graph (0, 0)][DBLP ] ICIP (3), 1999, pp:940-942 [Conf ] Cormac Herley , Poorvi L. Vora , Shawn Yang Detection and deterrence of counterfeiting of valuable documents. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:2423-2426 [Conf ] Poorvi L. Vora , Cormac Herley Trade-offs between Color Saturation and Noise Sensitivity in Image Sensors. [Citation Graph (0, 0)][DBLP ] ICIP (1), 1998, pp:196-200 [Conf ] Ping Wah Wong , Cormac Herley Area-Based Interpolation For Scaling of Images From a CCD. [Citation Graph (0, 0)][DBLP ] ICIP (1), 1997, pp:905-908 [Conf ] Zixiang Xiong , Cormac Herley , Kannan Ramchandran , Michael T. Orchard Space-frequency quantization for a space-varying wavelet packet image coder. [Citation Graph (0, 0)][DBLP ] ICIP, 1995, pp:614-617 [Conf ] Cormac Herley Automatic occlusion removal from minimum number of images. [Citation Graph (0, 0)][DBLP ] ICIP (2), 2005, pp:1046-1049 [Conf ] Cormac Herley Multirate Operations for Exact Interpolation and Iterative Subdivision Schemes. [Citation Graph (0, 0)][DBLP ] ISCAS, 1994, pp:169-172 [Conf ] Cormac Herley Boundary Filters for Finite-Length Signals and Time-Varying Filter Banks. [Citation Graph (0, 0)][DBLP ] ISCAS, 1994, pp:637-640 [Conf ] Cormac Herley , Martin Vetterli Orthogonal time-varying filter banks and wavelets. [Citation Graph (0, 0)][DBLP ] ISCAS, 1993, pp:391-394 [Conf ] Cormac Herley Accurate repeat finding and object skipping using fingerprints. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 2005, pp:656-665 [Conf ] Dinei A. F. Florêncio , Cormac Herley Analysis and Improvement of Anti-Phishing Schemes. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:148-157 [Conf ] Ashwin R. Bharambe , Cormac Herley , Venkata N. Padmanabhan Some observations on bitTorrent performance. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2005, pp:398-399 [Conf ] Cormac Herley , Zixiang Xiong , Kannan Ramchandran , Michael T. Orchard Joint space-frequency segmentation using balanced wavelet packet trees for least-cost image representation. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 1997, v:6, n:9, pp:1213-1230 [Journal ] Cormac Herley , Ping Wah Wong Minimum rate sampling and reconstruction of signals with arbitrary frequency support. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1999, v:45, n:5, pp:1555-1564 [Journal ] Cormac Herley ARGOS: automatically extracting repeating objects from multimedia streams. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Multimedia, 2006, v:8, n:1, pp:115-129 [Journal ] Dinei A. F. Florêncio , Cormac Herley KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:67-76 [Conf ] Ashwin R. Bharambe , Cormac Herley , Venkata N. Padmanabhan Analyzing and Improving a BitTorrent Networks Performance Mechanisms. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] Robert Ragno , Christopher J. C. Burges , Cormac Herley Inferring similarity between music objects with application to playlist generation. [Citation Graph (0, 0)][DBLP ] Multimedia Information Retrieval, 2005, pp:73-80 [Conf ] Dinei A. F. Florêncio , Cormac Herley A large-scale study of web password habits. [Citation Graph (0, 0)][DBLP ] WWW, 2007, pp:657-666 [Conf ] Passwords: If We're So Smart, Why Are We Still Using Them? [Citation Graph (, )][DBLP ] One-Time Password Access to Any Server without Changing the Server. [Citation Graph (, )][DBLP ] Can "Something You Know" Be Saved?. [Citation Graph (, )][DBLP ] A robust link-translating proxy server mirroring the whole web. [Citation Graph (, )][DBLP ] Protecting Financial Institutions from Brute-Force Attacks. [Citation Graph (, )][DBLP ] Evaluating a trial deployment of password re-use for phishing prevention. [Citation Graph (, )][DBLP ] Where do security policies come from? [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.005secs