Sciweavers

1757 search results - page 37 / 352
» Secure Content Validation
Sort
View
MCAM
2007
Springer
115views Multimedia» more  MCAM 2007»
15 years 5 months ago
Evolvement of DRM Schema: From Encryption to Interoperability and Monitoring
By reviewing DRMs up to now and two typical examples – AVS DRM and DMP IDP, the paper tries to find out the fundamental challenge of content protection approach from technical an...
Tiejun Huang
86
Voted
CIKM
2009
Springer
15 years 5 months ago
Automatic retrieval of similar content using search engine query interface
We consider the coverage testing problem where we are given a document and a corpus with a limited query interface and asked to find if the corpus contains a near-duplicate of th...
Ali Dasdan, Paolo D'Alberto, Santanu Kolay, Chris ...
JCP
2008
126views more  JCP 2008»
14 years 11 months ago
Content-Based Computer Simulation of a Networking Course: An Assessment
This paper presents a successful lab simulation experience to teach signal modulation and demodulation concepts in communication and computer networks to computer science and compu...
Giti Javidi, Ehsan Sheybani
IROS
2008
IEEE
138views Robotics» more  IROS 2008»
15 years 5 months ago
Approximating information content for active sensing tasks using the unscented transform
— This paper presents an approach to approximate information content for active sensing tasks. The Unscented Transform is used to represent probability distributions by a set of ...
Eric W. Frew
67
Voted
HICSS
1998
IEEE
135views Biometrics» more  HICSS 1998»
15 years 3 months ago
The Architecture of Secure Systems
Secure system design, veri cation and validation is often a daunting task, involving the merger of various protection mechanisms in conjunction with system security policy and con...
Jim Alves-Foss