Sciweavers

464 search results - page 31 / 93
» Privacy Engineering for Digital Rights Management Systems
Sort
View
USENIX
1993
14 years 11 months ago
HighLight: Using a Log-structured File System for Tertiary Storage Management
Robotic storage devices offer huge storage capacity at a low cost per byte, but with large access times. Integrating these devices into the storage hierarchy presents a challenge ...
John T. Kohl, Carl Staelin, Michael Stonebraker
CIT
2004
Springer
15 years 3 months ago
FPGA Based Implementation of an Invisible-Robust Image Watermarking Encoder
Abstract. Both encryption and digital watermarking techniques need to be incorporated in a digital rights management framework to address different aspects of content management. W...
Saraju P. Mohanty, Renuka Kumara C., Sridhara Naya...
CCS
2006
ACM
15 years 1 months ago
Doppelganger: Better browser privacy without the bother
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy ...
Umesh Shankar, Chris Karlof
IAAI
2003
14 years 11 months ago
TPO: A System for Scheduling and Managing Train Crew in Norway
This paper reports some results of a long-term work in application of AI techniques whose ultimate goal is the development of tools for resource scheduling. Most of the efforts so...
João P. Martins, Ernesto M. Morgado, Rolf H...
ADC
2006
Springer
139views Database» more  ADC 2006»
15 years 4 months ago
Peer-to-peer form based web information systems
The World Wide Web revolutionized the use of forms in everyday private and business life by allowing a move away from paper forms to easily accessible digital forms. Data captured...
Stijn Dekeyser, Jan Hidders, Richard Watson, Ron A...