Sciweavers

1242 search results - page 146 / 249
» Digital Objects as Passwords
Sort
View
COMPUTING
2007
424views more  COMPUTING 2007»
14 years 10 months ago
Anamorphic 3D geometry
An anamorphic image appears distorted from all but a few viewpoints. They have been studied by artists and architects since the early fifteenth century. Computer graphics opens t...
Dianne Hansford, D. Collins
IJNSEC
2007
127views more  IJNSEC 2007»
14 years 9 months ago
A Web-based Multilayer Access Control Model for Multimedia Applications in MPEG-7
This paper presents a Criterion-Based Role-Based Access Control model in which secure permissions (SP), secure operations (SOp), secure objects (SOb), and secure users (SU) are in...
Leon Pan
CCR
2005
126views more  CCR 2005»
14 years 9 months ago
Large scale content distribution protocols
This paper introduces large scale content distribution protocols, which are capable of scaling to massive numbers of users and providing low delay end-to-end delivery. Delivery of...
Christoph Neumann, Vincent Roca, Rod Walsh
MTA
2002
144views more  MTA 2002»
14 years 9 months ago
Semantic Extraction and Semantics-Based Annotation and Retrieval for Video Databases
Digital video databases have become more pervasive and finding video clips quickly in large databases becomes a major challenge. Due to the nature of video, accessing contents of v...
Yan Liu 0004, Fei Li
ATMOS
2010
136views Optimization» more  ATMOS 2010»
14 years 9 months ago
An Empirical Analysis of Robustness Concepts for Timetabling
Calculating timetables that are insensitive to disturbances has drawn considerable research efforts due to its practical importance on the one hand and its hard tractability by c...
Marc Goerigk, Anita Schöbel