Sciweavers

574 search results - page 59 / 115
» Beyond Search: Content Applications
Sort
View
ICDAR
1997
IEEE
14 years 3 days ago
Document image database retrieval and browsing using texture analysis
A system is presented that uses texture to retrieve and browse images stored in a large document image database. A method of graphically generating a candidate search image is use...
John F. Cullen, Jonathan J. Hull, Peter E. Hart
JAR
1998
60views more  JAR 1998»
13 years 7 months ago
Elimination of Self-Resolving Clauses
It is shown how self-resolving clauses like symmetry or transitivity, or even clauses like condensed detachment, can faithfully be deleted from the clause set thus eliminating or ...
Hans Jürgen Ohlbach
CCS
2006
ACM
13 years 11 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
IADIS
2003
13 years 9 months ago
Information Management and Interoperability Strategies: The Case for Digital Identifiers
The move from the current compartmentalised systems into an interoperable environment is the central challenge facing digital development this decade. In the quest for a semantic ...
Robin Wilson
RAID
2010
Springer
13 years 6 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao