Sciweavers

511 search results - page 72 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
157
Voted
3DPVT
2006
IEEE
242views Visualization» more  3DPVT 2006»
15 years 9 months ago
Towards On-Line Digital Doubles
We present a modular system for real-time 3D-scanning of human bodies under motion. The high-resolution shape and colour appearance is captured by several scanning units positione...
Andreas Griesser, Nico Cornelis, Luc J. Van Gool
177
Voted
SDMW
2010
Springer
15 years 1 months ago
Computationally Efficient Searchable Symmetric Encryption
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little ...
Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, P...
WWW
2004
ACM
16 years 4 months ago
Trust-serv: model-driven lifecycle management of trust negotiation policies for web services
A scalable approach to trust negotiation is required in Web service environments that have large and dynamic requester populations. We introduce Trust-Serv, a model-driven trust n...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati
129
Voted
ERCIMDL
2007
Springer
111views Education» more  ERCIMDL 2007»
15 years 10 months ago
Using Watermarks and Offline DRM to Protect Digital Images in DIAS
The Digital Image Archiving System (DIAS) is an image management system, the major functions of which are preserving valuable digital images and serving as an image provider for ex...
Hsin-Yu Chen, Hsiang-An Wang, Chin-Lung Lin
139
Voted
WWW
2005
ACM
16 years 4 months ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...