: This paper outlines some basic characteristics of digital rights management (DRM) systems, as well as the ways that DRM systems can threaten user privacy. The author asserts that...
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
One of the outcomes of Moore's Law - according to which the exponential growth of technical advances in computer science is pushing more and more of our computers into obsole...
Thimoty Barbieri, Franca Garzotto, Giovanni Beltra...
The Rock Art Project was set up by the Directorate for Cultural Heritage on behalf of the Norwegian Ministry of the Environment in 1996. The database was initiated within the EU-s...
Wenche Helliksen, Inger Marie Holm-Olsen, Olaug Ha...
The paper studies machine learning problems where each example is described using a set of Boolean features and where hypotheses are represented by linear threshold elements. One ...