Sciweavers

863 search results - page 66 / 173
» Computational Methods for Intelligent Information Access
Sort
View
DRM
2008
Springer
15 years 5 months ago
Enforcing DRM policies across applications
In this paper we present Trishul-UCON (T-UCON), a DRM system based on the UCONABC model. T-UCON is designed to be capable of enforcing not only application-specific policies, as a...
Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabrie...
TSP
2010
14 years 10 months ago
Generalized discrete Fourier transform with nonlinear phase
Constant modulus transforms like discrete Fourier transform (DFT), Walsh transform, and Gold codes have been successfully used over several decades in several engineering applicati...
Ali N. Akansu, Handan Agirman-Tosun
KES
2005
Springer
15 years 8 months ago
Lightweight Agent Framework for Camera Array Applications
This paper describes a lightweight middleware agent framework (LAF) for coordinating a large array of computers with attached cameras to construct high resolution video-rate image ...
Lee Middleton, Sylvia C. Wong, Michael O. Jewell, ...
CW
2005
IEEE
15 years 5 months ago
Semantic Memory for Avatars in Cyberspace
Avatars that show intelligent behavior should have an access to general knowledge about the world, knowledge that humans store in their semantic memories. The simplest knowledge r...
Julian Szymanski, Tomasz Sarnatowicz, Wlodzislaw D...
138
Voted
WWW
2001
ACM
16 years 4 months ago
Seeing the whole in parts: text summarization for web browsing on handheld devices
We introduce five methods for summarizing parts of Web pages on handheld devices, such as personal digital assistants (PDAs), or cellular phones. Each Web page is broken into text...
Orkut Buyukkokten, Hector Garcia-Molina, Andreas P...