Sciweavers

1242 search results - page 96 / 249
» Digital Objects as Passwords
Sort
View
ICMCS
2005
IEEE
122views Multimedia» more  ICMCS 2005»
15 years 3 months ago
A Constraint-Based Approach for the Authoring of Multi-Topic Multimedia Presentations
Synchronized multimedia applications play an important role in a Digital Library environment, since they allow one to efficiently disseminate knowledge among differently skilled ...
Elisa Bertino, Elena Ferrari, Andrea Perego, Diego...
SIGDOC
2005
ACM
15 years 3 months ago
Information fragments for a pervasive world
Is the second paragraph dead? Technology and users are tending to create and consume information in ever decreasing chunks, forcing content creators to create shorter fragments of...
Russell Beale
POLICY
2004
Springer
15 years 3 months ago
Towards a Multi-dimensional Characterization of Dissemination Control
Dissemination control (DCON) is emerging as one of the most important and challenging goals for information security. DCON is concerned with controlling information and digital ob...
Roshan K. Thomas, Ravi S. Sandhu
SETN
2004
Springer
15 years 3 months ago
Data Brokers: Building Collections through Automated Negotiation
Collecting digital materials is time-consuming and can gain from automation. Since each source—and even each acquisition—may involve a separate negotiation of terms, a collecto...
Fillia Makedon, Song Ye, Sheng Zhang, James Ford, ...
DATE
2003
IEEE
105views Hardware» more  DATE 2003»
15 years 3 months ago
Detecting Soft Errors by a Purely Software Approach: Method, Tools and Experimental Results
In this paper is described a software technique allowing to detect soft errors occurring in processor-based digital architectures. The detection mechanism is based on a set of rul...
B. Nicolescu, Raoul Velazco