Sciweavers

24 search results - page 2 / 5
» Liability for defective content
Sort
View
SCN
2004
Springer
112views Communications» more  SCN 2004»
13 years 10 months ago
Controlling Spam by Secure Internet Content Selection
Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure Internet Content Selection (SICS) protocol, an effic...
Amir Herzberg
DRM
2003
Springer
13 years 10 months ago
How DRM-based content delivery systems disrupt expectations of "personal use"
We set out to examine whether current, DRM-based online offerings of music and movies accord with consumers’ current expectations regarding the personal use of copyrighted works...
Deirdre K. Mulligan, John Han, Aaron J. Burstein
MJ
2008
71views more  MJ 2008»
13 years 5 months ago
A new type of structural defects in CdZnSe/ZnSe heterostructures
The changes of structural and photoluminescence (PL) characteristics of MBE-grown CdZnSe/ZnSe single quantum well (QW) structures caused by Cd/Zn interdiffusion were studied by hi...
L. V. Borkovska, N. Korsunska, V. Kladko, M. Slobo...
PRL
2006
117views more  PRL 2006»
13 years 5 months ago
Multiscale Fourier descriptors for defect image retrieval
Shape is an essential visual feature of an image and it is widely used to describe image content in image classification and retrieval. In this paper, two new Fourier-based approa...
Iivari Kunttu, Leena Lepistö, Juhani Rauhamaa...
MVA
2006
13 years 5 months ago
Fourier-Based Object Description in Defect Image Retrieval
Abstract Image retrieval has nowadays several industrial applications. In these imaging applications, which typically use large image archives, the matter of computational efficien...
Iivari Kunttu, Leena Lepistö, Juhani Rauhamaa...