Sciweavers

3811 search results - page 718 / 763
» The Safe-Tcl Security Model
Sort
View
ACSW
2003
15 years 1 months ago
Digital Rights Management for Content Distribution
Transferring the traditional business model for selling digital goods linked to physical media to the online world leads to the need for a system to protect digital intellectual p...
Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sh...
IIWAS
2003
15 years 1 months ago
The Effect of Information Seeking Behavior on an Online Purchase Intention
This paper reports a research in progress to study the effect of information seeking behavior on an online purchase intention. There are several strategies people use to find info...
Paulus Insap Santosa
IMAMS
2003
212views Mathematics» more  IMAMS 2003»
15 years 1 months ago
Watermarking 3D Polygonal Meshes Using the Singular Spectrum Analysis
Watermarking is to embed a structure called a watermark into the target data such as images. The watermark can be used, for example, in order to secure the copyright and detect tam...
Kohei Muratani, Kokichi Sugihara
JISBD
2003
15 years 1 months ago
Advanced Separation of Concerns for Requirements Engineering
Separation of concerns is a fundamental software engineering principle that proposes the encapsulation of each matter of interest in a separate module. Software engineering develop...
Isabel Sofia Brito, Ana M. D. Moreira
SEC
2000
15 years 1 months ago
Improving Packet Filters Management through Automatic and Dynamic Schemes
: The development of complex access control architectures raises the problem of their management. In this article, we describe an architecture providing packet filters configuratio...
Olivier Paul, Maryline Laurent