Sciweavers

123 search results - page 13 / 25
» Dependency Management for the Preservation of Digital Inform...
Sort
View
WPES
2003
ACM
14 years 19 days ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
ICDIM
2008
IEEE
14 years 1 months ago
Unsupervised key-phrases extraction from scientific papers using domain and linguistic knowledge
The domain of Digital Libraries presents specific challenges for unsupervised information extraction to support both the automatic classification of documents and the enhancement ...
Mikalai Krapivin, Maurizio Marchese, Andrei Yadran...
WSDM
2010
ACM
213views Data Mining» more  WSDM 2010»
14 years 4 months ago
Corroborating Information from Disagreeing Views
We consider a set of views stating possibly conflicting facts. Negative facts in the views may come, e.g., from functional dependencies in the underlying database schema. We want ...
Alban Galland, Serge Abiteboul, Amélie Mari...
ICMCS
2006
IEEE
130views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Directional Weighting-Based Demosaicking Algorithm for Noisy CFA Environments
Captured CFA data by image sensors like CCD/or CMOS are often corrupted by noises. To produce high quality images acquired by CCD/CMOS digital cameras, the problem of noise needs ...
Hung-Yi Lo, Tsung-Nan Lin, Chih-Lung Hsu, Cheng-hs...
DAC
2010
ACM
13 years 11 months ago
Quality metric evaluation of a physical unclonable function derived from an IC's power distribution system
The level of security provided by digital rights management functions and cryptographic protocols depend heavily on the security of an embedded secret key. The current practice of...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic