Sciweavers

2421 search results - page 26 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
TSMC
2008
162views more  TSMC 2008»
13 years 10 months ago
A New Model for Secure Dissemination of XML Content
Abstract--The paper proposes an approach to content dissemination that exploits the structural properties of an Extensible Markup Language (XML) document object model in order to p...
Ashish Kundu, Elisa Bertino
DS
1997
117views Database» more  DS 1997»
14 years 9 days ago
Experience with a Combined Approach to Attribute-Matching Across Heterogeneous Databases
Determining attribute correspondences is a difficult, time-consuming, knowledge-intensive part of database integration. We report on experiences with tools that identified candi...
Chris Clifton, E. Housman, Arnon Rosenthal
SOCIALCOM
2010
13 years 5 months ago
A Multi-factor Approach to Securing Software on Client Computing Platforms
Protecting the integrity of software platforms, especially in unmanaged consumer computing systems is a difficult problem. Attackers may attempt to execute buffer overflow attacks ...
Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar,...
DAGM
2005
Springer
14 years 4 months ago
Vision-Based 3D Object Localization Using Probabilistic Models of Appearance
The ability to accurately localize objects in an observed scene is regarded as an important precondition for many practical applications including automatic manufacturing, quality ...
Christian Plagemann, Thomas Müller, Wolfram B...
ICIP
2009
IEEE
15 years 44 sec ago
Video Coding Using Global Motion Temporal Filtering
Recent deblocking techniques are based on spatial filtering. We present a new deblocking technique based on temporal filtering of spatially aligned frames. This approach is used i...