Sciweavers

702 search results - page 56 / 141
» Making Digital Maps Accessible Using Vibrations
Sort
View
CCS
2006
ACM
14 years 28 days ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
FEGC
2010
307views Biometrics» more  FEGC 2010»
13 years 9 months ago
Visual sentence-phrase-based document representation for effective and efficient content-based image retrieval
Abstract. Having effective and efficient methods to get access to desired images is essential nowadays with the huge amount of digital images. This paper presents an analogy betwee...
Ismail Elsayad, Jean Martinet, Thierry Urruty, Cha...
IEEEARES
2010
IEEE
13 years 7 months ago
A New DRM Architecture with Strong Enforcement
—We propose a new DRM architecture that utilizes a two-step enforcement process to enable strong security even in the case of a compromised DRM viewer. This is achieved by using ...
Sascha Müller, Stefan Katzenbeisser
ACSAC
2010
IEEE
13 years 7 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
CVPR
2001
IEEE
14 years 11 months ago
Texture Replacement in Real Images
Texture replacement in real images has many applications, such as interior design, digital movie making and computer graphics. The goal is to replace some specified texture patter...
Yanghai Tsin, Yanxi Liu, Visvanathan Ramesh