Sciweavers

13180 search results - page 2528 / 2636
» Network Models
Sort
View
ICISC
2008
103views Cryptology» more  ICISC 2008»
15 years 4 months ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003
153
Voted
BXML
2004
15 years 4 months ago
Ontology-derived Activity Components for Composing Travel Web Services
: In this paper we present our ongoing work in creating a semantic Web service composition and execution framework. The efforts described are undertaken in the context of the SATIN...
Matthias Flügge, Diana Tourtchaninova
NSDI
2004
15 years 4 months ago
Efficient Routing for Peer-to-Peer Overlays
Most current peer-to-peer lookup schemes keep a small amount of routing state per node, typically logarithmic in the number of overlay nodes. This design assumes that routing info...
Anjali Gupta, Barbara Liskov, Rodrigo Rodrigues
131
Voted
ODRL
2004
15 years 4 months ago
Interoperability between ODRL and MPEG-21 REL
Two main Rights Expression Languages (RELs) exist to describe licenses governing the access to digital content: ODRL (Open Digital Rights Language) and MPEG-21 REL. Both RELs are ...
Josep Polo, Jose Prados, Jaime Delgado
VCIP
2003
148views Communications» more  VCIP 2003»
15 years 4 months ago
Semantic transcoding of video based on regions of interest
Traditional transcoding on multimedia has been performed from the perspectives of user terminal capabilities such as display sizes and decoding processing power, and network resou...
Jeongyeon Lim, Munchurl Kim, Jong-Nam Kim, Kyeongs...
« Prev « First page 2528 / 2636 Last » Next »