Sciweavers

10285 search results - page 1998 / 2057
» Composing Feature Models
Sort
View
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 8 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
120
Voted
SAC
2006
ACM
15 years 8 months ago
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya
SENSYS
2006
ACM
15 years 8 months ago
Run-time dynamic linking for reprogramming wireless sensor networks
From experience with wireless sensor networks it has become apparent that dynamic reprogramming of the sensor nodes is a useful feature. The resource constraints in terms of energ...
Adam Dunkels, Niclas Finne, Joakim Eriksson, Thiem...
WIKIS
2006
ACM
15 years 8 months ago
Foucault@Wiki: first steps towards a conceptual framework for the analysis of Wiki discourses
In this paper, we examine the discursive situation of Wikipedia. The primary goal is to explore principle ways of analyzing and characterizing the various forms of communicative u...
Christian Pentzold, Sebastian Seidenglanz
113
Voted
ACSAC
2005
IEEE
15 years 8 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
« Prev « First page 1998 / 2057 Last » Next »