Sciweavers

1308 search results - page 81 / 262
» Let's Have a Conversation
Sort
View
EUROPKI
2005
Springer
15 years 4 months ago
A Heterogeneous Network Access Service Based on PERMIS and SAML
Abstract The expansion of inter-organizational scenarios based on different authorization schemes involves the development of integration solutions allowing different authorizatio...
Gabriel López Millán, Óscar C...
BMCBI
2010
233views more  BMCBI 2010»
14 years 11 months ago
Odefy -- From discrete to continuous models
Background: Phenomenological information about regulatory interactions is frequently available and can be readily converted to Boolean models. Fully quantitative models, on the ot...
Jan Krumsiek, Sebastian Pölsterl, Dominik M. ...
ISI
2006
Springer
14 years 11 months ago
Measures to Detect Word Substitution in Intercepted Communication
Abstract. Those who want to conceal the content of their communications can do so by replacing words that might trigger attention by other words or locutions that seem more ordinar...
SzeWang Fong, David B. Skillicorn, Dmitri Roussino...
ICIP
2004
IEEE
16 years 24 days ago
On information hiding with incomplete information about steganalysis
Suppose the information hider has a set of information hiding schemes to be employed in the presence of a set of steganalysis detectors. Let the information hider have only an inc...
Rajarathnam Chandramouli
ICIP
2000
IEEE
16 years 24 days ago
Nonlinear Image Interpolation Through Extended Permutation Filters
This paper examines the application of extended permutation rank selection (EPRS) filters in image interpolation. EPRS filters are constrained to output an order statistic based o...
Deva Ramanan, Kenneth E. Barner