Sciweavers

501 search results - page 75 / 101
» Simplification of Integrity Constraints for Data Integration
Sort
View
COOPIS
2003
IEEE
15 years 5 months ago
What Must (Not) Be Available Where?
Arranging the distribution of data, objects or components is a critical task that can ultimately affect the performance, integrity and reliability of distributed system. This pape...
Felix Bübl
IH
2001
Springer
15 years 4 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
15 years 3 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
AAAI
1993
15 years 1 months ago
Scientific Model-Building as Search in Matrix Spaces
Many reported discovery systems build discrete models of hidden structure, properties, or processes in the diverse fields of biology, chemistry, and physics. We show that the sear...
Raúl E. Valdés-Pérez, Jan M. ...
PAMI
2007
184views more  PAMI 2007»
14 years 11 months ago
Appearance Characterization of Linear Lambertian Objects, Generalized Photometric Stereo, and Illumination-Invariant Face Recogn
Traditional photometric stereo algorithms employ a Lambertian reflectance model with a varying albedo field and involve the appearance of only one object. In this paper, we gene...
Shaohua Kevin Zhou, Gaurav Aggarwal, Rama Chellapp...