Sciweavers

1307 search results - page 227 / 262
» Follow the intellectual property
Sort
View
NDSS
2007
IEEE
15 years 4 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
ACII
2007
Springer
15 years 3 months ago
Interpolating Expressions in Unit Selection
ended abstract reports on on-going work exploring the addition of a certain degree of control over expressivity in a unit selection context. Rather than merely choosing one unit se...
Marc Schröder
AMR
2007
Springer
167views Multimedia» more  AMR 2007»
15 years 3 months ago
Ontology: Use and Abuse
This paper is a critical analysis of the use of ontology as an instrument to specify the semantics of a document. The paper argue that not only is a logic of the type used in ontol...
Simone Santini
CMMR
2007
Springer
119views Music» more  CMMR 2007»
15 years 3 months ago
Understanding Emotion in Raag: An Empirical Study of Listener Responses
A survey of emotion in North Indian classical music was undertaken to determine the type and consistency of emotional responses to raag. Participants listened to five oneminute r...
Parag Chordia, Alex Rae
IESS
2007
Springer
120views Hardware» more  IESS 2007»
15 years 3 months ago
Error Containment in the Time-Triggered System-On-a-Chip Architecture
Abstract: The time-triggered System-on-a-Chip (SoC) architecture provides a generic multicore system platform for a family of composable and dependable giga-scale SoCs. It supports...
Roman Obermaisser, Hermann Kopetz, Christian El Sa...