Sciweavers

2354 search results - page 44 / 471
» DRM as a layered system
Sort
View
TITS
2002
74views more  TITS 2002»
13 years 7 months ago
Emergency vehicle maneuvers and control laws for automated highway systems
The operation and transit of emergency vehicles on an automated highway system (AHS) designed under the control architecture proposed in the California Partners for Advanced Transi...
Charmaine Toy, Kevin Leung, Luis Alvarez, Roberto ...
SAC
2009
ACM
14 years 2 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni
DRMTICS
2005
Springer
14 years 1 months ago
A Vector Approach to Cryptography Implementation
The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptograph...
Jacques J. A. Fournier, Simon W. Moore
ACSAC
2004
IEEE
13 years 11 months ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
PRL
2010
100views more  PRL 2010»
13 years 6 months ago
Extraction of building polygons from SAR images: Grouping and decision-level in the GESTALT system
The GESTALT-System is a stratified architecture for challenging computer vision tasks. This contribution focuses on the 3rd and 4th layer of it – the grouping and decision layer...
Eckart Michaelsen, Uwe Stilla, Uwe Soergel, Leo J....