Sciweavers

1884 search results - page 267 / 377
» Abstraction from Counters: An Application on Real-Time Syste...
Sort
View
SIGMOD
2004
ACM
116views Database» more  SIGMOD 2004»
16 years 1 months ago
The Role of Cryptography in Database Security
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
Ueli M. Maurer
ISPAN
2009
IEEE
15 years 8 months ago
Vector Bank Based Multimedia Codec System-on-a-Chip (SoC) Design
—In this paper, we present a design architecture of implementing a ”Vector Bank” into video encoder system, namely, an H.264 encoder, in order to detect and analyze the movin...
Ruei-Xi Chen, Wei Zhao, Jeffrey Fan, Asad Davari
COLCOM
2008
IEEE
15 years 8 months ago
Combining Social Networks and Semantic Web Technologies for Personalizing Web Access
Abstract. The original purpose of Web metadata was to protect endusers from possible harmful content and to simplify search and retrieval. However they can also be exploited in mor...
Barbara Carminati, Elena Ferrari, Andrea Perego
124
Voted
ACCV
2007
Springer
15 years 7 months ago
Backward Segmentation and Region Fitting for Geometrical Visibility Range Estimation
Abstract. We present a new application of computer vision: continuous measurement of the geometrical visibility range on inter-urban roads, solely based on a monocular image acquis...
Erwan Bigorgne, Jean-Philippe Tarel
ESWS
2007
Springer
15 years 7 months ago
Extracting Social Networks Among Various Entities on the Web
Abstract. Social networks have recently attracted much attention for their importance to the Semantic Web. Several methods exist to extract social networks for people (particularly...
Jin Yingzi, Yutaka Matsuo, Mitsuru Ishizuka