Sciweavers

1843 search results - page 316 / 369
» Language-Derived Information and Context Models
Sort
View
VLDB
2007
ACM
160views Database» more  VLDB 2007»
15 years 10 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
ICMCS
2006
IEEE
118views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Spread-Spectrum Substitution watermarking Game
In the integrity checking context of multimedia contents, a malicious user aims at devising a forged content in order to fool a watermarker by making him use as a genuine content....
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
ECLIPSE
2006
ACM
15 years 10 months ago
Guidance through active concerns
Producing usable documentation has always been a tedious task, and even communicating important knowledge about a system among collaborators is difficult. This paper describes an ...
Barthélémy Dagenais, Harold Ossher
HICSS
2005
IEEE
104views Biometrics» more  HICSS 2005»
15 years 10 months ago
Vicious and Virtuous Cycles in Global Virtual Team Role Coordination
Role coordination is an important aspect of task performance in teams. This phenomenon has received little attention in global virtual teams (GVT) with their coordination hurdles....
Juliana Sutanto, Chee Wei Phang, Huei Huang Kuan, ...
ICDCSW
2005
IEEE
15 years 10 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani