Sciweavers

12493 search results - page 2247 / 2499
» Information Access in the Web
Sort
View
MIPS
2004
Springer
108views Multimedia» more  MIPS 2004»
15 years 7 months ago
Residual Motion Coding Method for Error Resilient Transcoding System
Abstract. For video adaptation in universal multimedia access systems, video contents have to be transcoded according to the requirements of network bandwidth and the performance o...
June-Sok Lee, Goo-Rak Kwon, Jae-Won Kim, Kyung-Hoo...
PAKDD
2004
ACM
100views Data Mining» more  PAKDD 2004»
15 years 7 months ago
Using Self-Consistent Naive-Bayes to Detect Masquerades
To gain access to account privileges, an intruder masquerades as the proper account user. This paper proposes a new strategy for detecting masquerades in a multiuser system. To det...
Kwong H. Yung
PCM
2004
Springer
118views Multimedia» more  PCM 2004»
15 years 7 months ago
Reach-Through-the-Screen: A New Metaphor for Remote Collaboration
For some years, our group at FX Palo Alto Laboratory has been developing technologies to support meeting recording, collaboration, and videoconferencing. This paper presents severa...
Jonathan Foote, Qiong Liu, Don Kimber, Patrick Chi...
PERVASIVE
2004
Springer
15 years 7 months ago
Accommodating Transient Connectivity in Ad Hoc and Mobile Settings
Much of the work on networking and communications is based on the premise that components interact in one of two ways: either they are connected via a stable wired or wireless netw...
Radu Handorean, Christopher D. Gill, Gruia-Catalin...
POLICY
2004
Springer
15 years 7 months ago
Responding to Policies at Runtime in TrustBuilder
Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach ...
Bryan Smith, Kent E. Seamons, Michael D. Jones
« Prev « First page 2247 / 2499 Last » Next »