Sciweavers

25175 search results - page 4870 / 5035
» MPEG-4 systems and applications
Sort
View
CCS
2007
ACM
15 years 4 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
CCS
2007
ACM
15 years 4 months ago
An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism
Browsers’ isolation mechanisms are critical to users’ safety and privacy on the web. Achieving proper isolations, however, is very difficult. Historical data show that even fo...
Shuo Chen, David Ross, Yi-Min Wang
CIKM
2007
Springer
15 years 4 months ago
A volcano erupts: semantically mediated integration of heterogeneous volcanic and atmospheric data
We present a research effort into the application of semantic web methods and technologies to address the challenging problem of integrating heterogeneous volcanic and atmospheri...
Peter Fox, Deborah L. McGuinness, Robert Raskin, A...
CIVR
2007
Springer
164views Image Analysis» more  CIVR 2007»
15 years 4 months ago
Inducing a perceptual relevance shape classifier
In this paper, we develop a system to classify the outputs of image segmentation algorithms as perceptually relevant or perceptually irrelevant with respect to human perception. T...
Victoria J. Hodge, John P. Eakins, James Austin
ER
2007
Springer
137views Database» more  ER 2007»
15 years 4 months ago
Prioritized Preferences and Choice Constraints
It is increasingly recognised that user preferences should be addressed in many advanced database applications, such as adaptive searching in databases. However, the fundamental is...
Wilfred Ng
« Prev « First page 4870 / 5035 Last » Next »