Sciweavers

2061 search results - page 387 / 413
» Authorization for Metacomputing Applications
Sort
View
97
Voted
DRM
2006
Springer
15 years 1 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
ECTEL
2006
Springer
15 years 1 months ago
Blended Learning Concepts - a Short Overview
This paper presents a short overview of blended learning, showing arguments for and against these concepts. Potential blended learning scenarios are described that vary depending o...
Sonja Trapp
ISMIR
2000
Springer
168views Music» more  ISMIR 2000»
15 years 1 months ago
Mel Frequency Cepstral Coefficients for Music Modeling
We examine in some detail Mel Frequency Cepstral Coefficients (MFCCs) - the dominant features used for speech recognition - and investigate their applicability to modeling music. ...
Beth Logan
SPATIALCOGNITION
2000
Springer
15 years 1 months ago
Cognitive Zoom: From Object to Path and Back Again
This paper posits the usefulness of mental shifts of scale and perspective in thinking and communicating about spatial relations, and describes two experimental techniques for res...
Carol Strohecker
ICCD
1995
IEEE
109views Hardware» more  ICCD 1995»
15 years 1 months ago
Verifying the performance of the PCI local bus using symbolic techniques
Symbolic model checking is a successful technique for checking properties of large finite-state systems. This method has been used to verify a number of real-world hardware desig...
Sérgio Vale Aguiar Campos, Edmund M. Clarke...