Sciweavers

2550 search results - page 482 / 510
» Enterprise Content Management
Sort
View
SP
2007
IEEE
137views Security Privacy» more  SP 2007»
14 years 2 months ago
A Cryptographic Decentralized Label Model
Information-flow security policies are an appealing way of specifying confidentiality and integrity policies in information systems. Most previous work on language-based securit...
Jeffrey A. Vaughan, Steve Zdancewic
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
14 years 2 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
CLEF
2007
Springer
14 years 2 months ago
Using Pseudo-Relevance Feedback to Improve Image Retrieval Results
In this paper, we propose a pseudo-relevance feedback method to deal with the photographic retrieval and medical retrieval tasks of ImageCLEF 2007. The aim of our participation to...
Mouna Torjmen, Karen Pinel-Sauvagnat, Mohand Bough...
CLEF
2007
Springer
14 years 2 months ago
Cross-Lingual Information Retrieval System for Indian Languages
This paper describes our first participation in the Indian language sub-task of the main Adhoc monolingual and bilingual track in CLEF1 competition. In this track, the task is to...
Jagadeesh Jagarlamudi, A. Kumaran
CLEF
2007
Springer
14 years 2 months ago
MIRACLE at GeoCLEF Query Parsing 2007: Extraction and Classification of Geographical Information
This paper describes the participation of MIRACLE research consortium at the Query Parsing task of GeoCLEF 2007. Our system is composed of three main modules. First, the Named Geo...
Sara Lana-Serrano, Julio Villena-Román, Jos...