Sciweavers

1307 search results - page 163 / 262
» Follow the intellectual property
Sort
View
TRUST
2009
Springer
15 years 8 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
XSYM
2009
Springer
264views Database» more  XSYM 2009»
15 years 8 months ago
From Entity Relationship to XML Schema: A Graph-Theoretic Approach
Abstract. We propose a mapping from the Enhanced Entity Relationship conceptual model to the W3C XML Schema Language with the following properties: information and integrity constr...
Massimo Franceschet, Donatella Gubiani, Angelo Mon...
ICIAR
2009
Springer
15 years 8 months ago
The Use of Residuals in Image Denoising
Abstract. State-of-the-art image denoising algorithms attempt to recover natural image signals from their noisy observations, such that the statistics of the denoised image follow ...
Dominique Brunet, Edward R. Vrscay, Zhou Wang
IVIC
2009
Springer
15 years 8 months ago
Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing
Abstract. Due to privacy concern on the widespread use of biometric authentication systems, biometric template protection has gained great attention in the biometric research recen...
Zhe Jin, Andrew Beng Jin Teoh, Thian Song Ong, Con...
ISSTA
2009
ACM
15 years 8 months ago
Analyzing singularity channel contracts
This paper presents techniques for analyzing channel contract specifications in Microsoft Research’s Singularity operating system. A channel contract is a state machine that sp...
Zachary Stengel, Tevfik Bultan