Sciweavers

2386 search results - page 7 / 478
» Database Security 2000
Sort
View
AGENTS
2001
Springer
15 years 2 months ago
ATTac-2000: an adaptive autonomous bidding agent
The First Trading Agent Competition TAC was held from June 22nd to July 8th, 2000. TAC was designed to create a benchmark problem in the complex domain of emarketplaces and to m...
Peter Stone, Michael L. Littman, Satinder P. Singh...
OOPSLA
2007
Springer
15 years 3 months ago
Elephant 2000: a programming language based on speech acts
: Elephant 2000 is a vehicle for some ideas about programming language features. We expect these features to be valuable in writing and verifying programs that interact with people...
John McCarthy
ICMCS
2006
IEEE
101views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Lightweight JPEG2000 Encryption with Anisotropic Wavelet Packets
A lightweight encryption technique for JPEG2000 with optional support for transparent encryption is proposed. Randomized anisotropic wavelet packet bases are used to construct a s...
Dominik Engel, Andreas Uhl
MM
2003
ACM
132views Multimedia» more  MM 2003»
15 years 2 months ago
A flexible and scalable authentication scheme for JPEG2000 image codestreams
JPEG2000 is an emerging standard for still image compression and is becoming the solution of choice for many digital imaging fields and applications. An important aspect of JPEG2...
Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong ...