Sciweavers

503 search results - page 29 / 101
» Authenticity by tagging and typing
Sort
View
GCC
2003
Springer
14 years 2 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
ICMCS
2010
IEEE
212views Multimedia» more  ICMCS 2010»
13 years 10 months ago
Homogeneous segmentation and classifier ensemble for audio tag annotation and retrieval
Audio tags describe different types of musical information such as genre, mood, and instrument. This paper aims to automatically annotate audio clips with tags and retrieve releva...
Hung-Yi Lo, Ju-Chiang Wang, Hsin-Min Wang
PERCOM
2006
ACM
14 years 8 months ago
Analysing fundamental properties of marker-based vision system designs
This paper investigates fundamental properties of Marker-based Vision (MBV) systems. We present a theoretical analysis of the performance of basic tag designs which is extended th...
Andrew C. Rice, Robert K. Harle, Alastair R. Beres...
PET
2005
Springer
14 years 2 months ago
High-Power Proxies for Enhancing RFID Privacy and Utility
A basic radio-frequency identification (RFID) tag is a small and inexpensive microchip that emits a static identifier in response to a query from a nearby reader. Basic tags of t...
Ari Juels, Paul F. Syverson, Daniel V. Bailey
MHCI
2009
Springer
14 years 3 months ago
Text versus speech: a comparison of tagging input modalities for camera phones
Speech and typed text are two common input modalities for mobile phones. However, little research has compared them in their ability to support annotation and retrieval of digital...
Mauro Cherubini, Xavier Anguera, Nuria Oliver, Rod...