Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John Burns is active.

Publication


Featured researches published by John Burns.


Pattern Recognition Letters | 2003

Performance analysis of pattern classifier combination by plurality voting

Sherif Yacoub; John Burns; Steven J. Simske

Plurality voting is widely used in pattern recognition. However, there is little theoretical analysis of plurality voting. In this paper, we attempt to explore the rationale behind plurality voting. The recognition/error/rejection rates of plurality voting are compared with those of majority voting under different conditions. It is demonstrated that plurality voting is more efficient in achieving the tradeoff between rejection rate and error rate. We also discuss some practical problems when applying plurality voting to real-world applications.


IEEE Transactions on Computers | 1994

Parameter selection for server-aided RSA computation schemes

John Burns; Chris J. Mitchell

The security, complexity, and application of two schemes for using an untrusted auxiliary processor to aid smart card RSA signature computations are reviewed, including detailed analysis of possible methods of attack. Guidance is given on practical, secure use of these schemes. >


IEEE Journal on Selected Areas in Communications | 1989

An architecture for a mobile OSI mail access system

Robert Cole; John Burns

An architecture and implementation which support an interface to the X.400 mail environment using the full open-systems communications protocols for a portable computer are described. The implementation is designed to be used over a cellular radio telephone network. The portable computer is used to implement the user agent interface of the CCITT X.413 (1988) message store. A full set of security facilities, designed for use with interpersonal messaging (IPM), is included in the architecture. A number of important issues are discussed regarding the placement and management of keys for the IPM security, as well as authentication between the user and the portable computer and between the user agent and the message store. To support the use of the CCITT message-store model, it was necessary to implement a full protocol stack for open systems interconnection on the portable computer. The design and the authors experiences are described. >


Computers & Security | 1990

A security scheme for resource sharing over a network

John Burns; Chris J. Mitchell

The purpose of this paper is to describe a security scheme for a special purpose resource-sharing system for networked computers. The scheme makes use of cryptographic constructs called coupons, issued by a central authority, and representing the right to use a certain amount of resources on a specified machine. The security scheme is described in detail, and an analysis of its security is also given.


document engineering | 2005

Document digitization lifecycle for complex magazine collection

Sherif Yacoub; John Burns; Paolo Faraboschi; Daniel Ortega; Jose Abad Peiro; Vinay Saxena

The conversion of large collections of documents from paper to digital formats that are suitable for electronic archival is a complex multi-phase process. The creation of good quality images from paper documents is just one phase. To extract relevant information that they contain, with an accuracy that fits the purpose of target applications, an automated document analysis system and a manual verification/review process are needed. The automated system needs to perform a variety of analysis and recognition tasks in order to reach an accuracy level that minimizes the manual correction effort downstream.This paper describes the complete process and the associated technologies, tools, and systems needed for the conversion of a large collection of complex documents and deployment for online web access to its information rich content. We used this process to recapture 80 years of Time magazines. The historical collection is scanned, automatically processed by advanced document analysis components to extract articles, manually verified for accuracy, and converted in a form suitable for web access. We discuss the major phases of the conversion lifecycle and the technology developed and tools used for each phase. We also discuss results in terms of recognition accuracy.


Archive | 1992

Position-sensing apparatus

John Burns; Sheelagh Lloyd


conference of the international speech communication association | 2003

Recognition of emotions in interactive voice response systems.

Sherif Yacoub; Steven J. Simske; John Burns


Archive | 1992

Coding Schemes for Two-Dimensional Position Sensing

John Burns; Chris J. Mitchell


Archive | 1994

Initial track recovery in position-sensing systems that use windowing patterns

John Burns; Sheelagh Lloyd


international symposium on software reliability engineering | 2003

Automating the analysis of voting systems

Sherif Yacoub; Steven J. Simske; John Burns

Collaboration


Dive into the John Burns's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge