Sciweavers

240 search results - page 29 / 48
» Context-Aware Trust Domains
Sort
View
SEMWEB
2009
Springer
14 years 1 months ago
Semantic Provenance for Science Data Products: Application to Image Data Processing
—A challenge in providing scientific data services to a broad user base is to also provide the metadata services and tools the user base needs to correctly interpret and trust t...
Stephan Zednik, Peter Fox, Deborah L. McGuinness, ...
ADVIS
2004
Springer
14 years 2 months ago
Practical and Secure E-Mail System (PractiSES)
In this paper, a practical and secure e-mail system (called “PractiSES”) that performs public key distribution and management in a unique way is proposed. PractiSES is a networ...
Albert Levi, Mahmut Özcan
EUROSEC
2009
ACM
14 years 3 months ago
Secure 3D graphics for virtual machines
In this paper a new approach to API remoting for GPU virtualisation is described which aims to reduce the amount of trusted code involved in 3D rendering for guest VMs. To achieve...
Christopher Smowton
CISC
2008
Springer
118views Cryptology» more  CISC 2008»
13 years 10 months ago
Inter-domain Identity-Based Proxy Re-encryption
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts hav...
Qiang Tang, Pieter H. Hartel, Willem Jonker
INTERSPEECH
2010
13 years 3 months ago
Semi-supervised part-of-speech tagging in speech applications
When no training or adaptation data is available, semisupervised training is a good alternative for processing new domains. We perform Bayesian training of a part-of-speech (POS) ...
Richard Dufour, Benoît Favre