Sciweavers

6195 search results - page 1178 / 1239
» Cloud Computing Security
Sort
View
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
15 years 10 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
MSWIM
2005
ACM
15 years 10 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
MM
2004
ACM
212views Multimedia» more  MM 2004»
15 years 9 months ago
Nonparametric motion model
Motion information is a powerful cue for visual perception. In the context of video indexing and retrieval, motion content serves as a useful source for compact video representati...
Ling-Yu Duan, Min Xu, Qi Tian, Changsheng Xu
GI
2004
Springer
15 years 9 months ago
Towards a Framework and a Design Methodology for Autonomic Integrated Systems
: The transition from microelectronics to nanoelectronics reaches physical limits and results in a paradigm shift in the design and fabrication of electronic circuits. The conserva...
Andreas Herkersdorf, Wolfgang Rosenstiel
MFCS
2004
Springer
15 years 9 months ago
Boxed Ambients with Communication Interfaces
We define BACI (Boxed Ambients with Communication Interfaces), an ambient calculus with a flexible communication policy. Traditionally, typed ambient calculi have a fixed commu...
Eduardo Bonelli, Adriana B. Compagnoni, Mariangiol...
« Prev « First page 1178 / 1239 Last » Next »