Sciweavers

21324 search results - page 3996 / 4265
» Making the case for computing
Sort
View
131
Voted
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
15 years 9 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
140
Voted
CIVR
2007
Springer
119views Image Analysis» more  CIVR 2007»
15 years 9 months ago
An in-memory relevance feedback technique for high-performance image retrieval systems
Content-based image retrieval with relevant feedback has been widely adopted as the query model of choice for improved effectiveness in image retrieval. The effectiveness of thi...
Ning Yu, Khanh Vu, Kien A. Hua
138
Voted
CIVR
2007
Springer
177views Image Analysis» more  CIVR 2007»
15 years 9 months ago
Matching ottoman words: an image retrieval approach to historical document indexing
Large archives of Ottoman documents are challenging to many historians all over the world. However, these archives remain inaccessible since manual transcription of such a huge vo...
Esra Ataer, Pinar Duygulu
142
Voted
CIVR
2007
Springer
195views Image Analysis» more  CIVR 2007»
15 years 9 months ago
Towards optimal bag-of-features for object categorization and semantic video retrieval
Bag-of-features (BoF) deriving from local keypoints has recently appeared promising for object and scene classification. Whether BoF can naturally survive the challenges such as ...
Yu-Gang Jiang, Chong-Wah Ngo, Jun Yang 0003
DRM
2007
Springer
15 years 9 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
« Prev « First page 3996 / 4265 Last » Next »