Sciweavers

826 search results - page 132 / 166
» Medical Requirements for Data Protection
Sort
View
VLSID
2004
IEEE
168views VLSI» more  VLSID 2004»
15 years 10 months ago
VLSI Implementation of Visible Watermarking for a Secure Digital Still Camera Design
Watermarking is the process that embeds data called a watermark into a multimedia object for its copyright protection. The digital watermarks can be visible to a viewer on careful...
Saraju P. Mohanty, Nagarajan Ranganathan, Ravi Nam...
SOSP
2007
ACM
15 years 6 months ago
TxLinux: using and managing hardware transactional memory in an operating system
TxLinux is a variant of Linux that is the first operating system to use hardware transactional memory (HTM) as a synchronization primitive, and the first to manage HTM in the sc...
Christopher J. Rossbach, Owen S. Hofmann, Donald E...
CCS
2009
ACM
15 years 4 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...
MMM
2007
Springer
128views Multimedia» more  MMM 2007»
15 years 4 months ago
Video Histogram: A Novel Video Signature for Efficient Web Video Duplicate Detection
The explosive growth of information technology and digital content industry stimulates various video applications over the Internet. Since it is quite easy to copy, reformat, modif...
Lu Liu, Wei Lai, Xian-Sheng Hua, Shi-Qiang Yang
PRDC
2007
IEEE
15 years 4 months ago
PAI: A Lightweight Mechanism for Single-Node Memory Recovery in DSM Servers
Several recent studies identify the memory system as the most frequent source of hardware failures in commercial servers. Techniques to protect the memory system from failures mus...
Jangwoo Kim, Jared C. Smolens, Babak Falsafi, Jame...