Sciweavers

5705 search results - page 1124 / 1141
» Web services policies
Sort
View
ICICS
2005
Springer
15 years 3 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
IFIP
2005
Springer
15 years 3 months ago
Content-Based Image Retrieval for Digital Forensics
Digital forensic investigators are often faced with the task of manually examining a large number of (photographic) images in order to identify potential evidence. The task can be...
Yixin Chen, Vassil Roussev, Golden G. Richard III,...
ISMIR
2005
Springer
206views Music» more  ISMIR 2005»
15 years 3 months ago
Improving Content-Based Similarity Measures by Training a Collaborative Model
We observed that for multimedia data – especially music - collaborative similarity measures perform much better than similarity measures derived from content-based sound feature...
Richard Stenzel, Thomas Kamps
VLDB
2005
ACM
141views Database» more  VLDB 2005»
15 years 3 months ago
Automatic Data Fusion with HumMer
Heterogeneous and dirty data is abundant. It is stored under different, often opaque schemata, it represents identical real-world objects multiple times, causing duplicates, and ...
Alexander Bilke, Jens Bleiholder, Christoph Bö...
IUI
2004
ACM
15 years 3 months ago
An intelligent assistant for interactive workflow composition
Complex applications in many areas, including scientific computations and business-related web services, are created from collections of components to form workflows. In many case...
Jihie Kim, Marc Spraragen, Yolanda Gil
« Prev « First page 1124 / 1141 Last » Next »