Sciweavers

1061 search results - page 161 / 213
» Integrity Constraints for Linked Data
Sort
View
IH
2001
Springer
14 years 2 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
14 years 2 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
AAAI
1993
13 years 11 months ago
Scientific Model-Building as Search in Matrix Spaces
Many reported discovery systems build discrete models of hidden structure, properties, or processes in the diverse fields of biology, chemistry, and physics. We show that the sear...
Raúl E. Valdés-Pérez, Jan M. ...
PAMI
2007
184views more  PAMI 2007»
13 years 9 months ago
Appearance Characterization of Linear Lambertian Objects, Generalized Photometric Stereo, and Illumination-Invariant Face Recogn
Traditional photometric stereo algorithms employ a Lambertian reflectance model with a varying albedo field and involve the appearance of only one object. In this paper, we gene...
Shaohua Kevin Zhou, Gaurav Aggarwal, Rama Chellapp...
CONEXT
2010
ACM
13 years 8 months ago
Auto-configuration of 802.11n WLANs
Channel Bonding (CB) combines two adjacent frequency bands to form a new, wider band to facilitate high data rate transmissions in MIMO-based 802.11n networks. However, the use of...
Mustafa Y. Arslan, Konstantinos Pelechrinis, Ioann...