The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Many object-oriented information systems share an architectural style that emphasizes flexibility and dynamically configurable. Business rules are stored in a database instead of ...
In this paper we propose a new metaphor of information retrieving, usable in heritage management and publishing. Based on the net, the user is able to participate in virtual guide...
Dorin Mircea Popovici, Serge Morvan, Eric Maisel, ...
For describing and analyzing digital images of paintings we propose a model to serve as the basis for an interactive image retrieval system. The model defines two types of feature...
Thomas E. Lombardi, Sung-Hyuk Cha, Charles C. Tapp...