Sciweavers

1949 search results - page 15 / 390
» Protective Interface Specifications
Sort
View
ICIP
2008
IEEE
15 years 4 months ago
H.264/AVC video scrambling for privacy protection
In this paper, we address the problem of privacy in video surveillance systems. More specifically, we consider the case of H.264/AVC which is the state-of-the-art in video coding....
Frédéric Dufaux, Touradj Ebrahimi
ISI
2006
Springer
14 years 9 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
ICDCS
1996
IEEE
15 years 1 months ago
Hidden Software Capabilities
: Software capabilities are a very convenient means to protect co-operating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacti...
Daniel Hagimont, Jacques Mossière, Xavier R...
ISORC
2002
IEEE
15 years 2 months ago
A Framework for Integrating the Real-Time Specification for Java and Java's Remote Method Invocation
This paper proposes a framework for integrating the Real-Time Specification for Java and Java's Remote Method Invocation. The concepts of real-time remote and distributed rea...
Andy J. Wellings, Roy Clark, E. Douglas Jensen, Do...
WWW
2006
ACM
15 years 10 months ago
Relaxed: on the way towards true validation of compound documents
To maintain interoperability in the Web environment it is necessary to comply with Web standards. Current specifications of HTML and XHTML languages define conformance conditions ...
Jirka Kosek, Petr Nálevka