Sciweavers

666 search results - page 11 / 134
» Design and implementation of a live-analysis digital forensi...
Sort
View
NSPW
2004
ACM
15 years 3 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
DIMEA
2008
190views Multimedia» more  DIMEA 2008»
14 years 11 months ago
Bridging the gap between the digital and the physical: design and evaluation of a mobile augmented reality guide for the museum
Can Augmented Reality (AR) techniques inform the design and implementation of a mobile multimedia guide for the museum setting? Drawing from our experience both on previous mobile...
Areti Damala, Pierre Cubaud, Anne Bationo, Pascal ...
CIT
2004
Springer
15 years 3 months ago
FPGA Based Implementation of an Invisible-Robust Image Watermarking Encoder
Abstract. Both encryption and digital watermarking techniques need to be incorporated in a digital rights management framework to address different aspects of content management. W...
Saraju P. Mohanty, Renuka Kumara C., Sridhara Naya...
DAGSTUHL
2007
14 years 11 months ago
Parallelism through Digital Circuit Design
Abstract. Two ways to exploit chips with a very large number of transistors are multicore processors and programmable logic chips. Some data parallel algorithms can be executed eï¬...
John O'Donnell
JUCS
2007
165views more  JUCS 2007»
14 years 9 months ago
A Cultural Information System Providing e-commerce Web Services, Digital Rights Management and Copyright Protection
: The issue addressed in this paper focuses on the design and implementation of an advanced information system for Cultural Organizations, which serves as a platform for the exploi...
Dimitris K. Tsolis, Spyros Sioutas, Lambros Drosso...