Sciweavers

24529 search results - page 4529 / 4906
» Computing on Authenticated Data
Sort
View
136
Voted
ISJGP
2007
146views more  ISJGP 2007»
15 years 4 months ago
End-to-End Security Across Wired-Wireless Networks for Mobile Users
Abstract  Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile us...
Sherali Zeadally, Nicolas Sklavos, Moganakrishnan ...
TIP
2008
127views more  TIP 2008»
15 years 4 months ago
SURE-LET Multichannel Image Denoising: Interscale Orthonormal Wavelet Thresholding
Abstract--We propose a vector/matrix extension of our denoising algorithm initially developed for grayscale images, in order to efficiently process multichannel (e.g., color) image...
Florian Luisier, Thierry Blu
TIP
2008
126views more  TIP 2008»
15 years 4 months ago
Maximum-Entropy Expectation-Maximization Algorithm for Image Reconstruction and Sensor Field Estimation
Abstract--In this paper, we propose a maximum-entropy expectation-maximization (MEEM) algorithm. We use the proposed algorithm for density estimation. The maximum-entropy constrain...
Hunsop Hong, Dan Schonfeld
IWC
2007
92views more  IWC 2007»
15 years 4 months ago
Consumers, channels and communication: Online and offline communication in service consumption
This paper reports on a study that investigated consumer use of e-services in a multichannel context. To develop a deeper understanding of what makes consumers decide to use the o...
Geke van Dijk, Shailey Minocha, Angus Laing
TKDE
2008
177views more  TKDE 2008»
15 years 4 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
« Prev « First page 4529 / 4906 Last » Next »