Sciweavers

2828 search results - page 539 / 566
» Multimedia information retrieval from recorded presentations
Sort
View
DRM
2007
Springer
14 years 2 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
JCDL
2006
ACM
147views Education» more  JCDL 2006»
14 years 2 months ago
The social life of books in the humane library
The development of public libraries may have inadvertently brought the age of marginalia to a close but the advent of digital libraries could revive the practice of marginal annot...
Yoram Chisik, Nancy Kaplan
VISUALIZATION
2005
IEEE
14 years 1 months ago
Query-Driven Visualization of Large Data Sets
We present a practical and general-purpose approach to large and complex visual data analysis where visualization processing, rendering and subsequent human interpretation is cons...
Kurt Stockinger, John Shalf, Kesheng Wu, E. Wes Be...
EMISA
2004
Springer
14 years 1 months ago
eSarine - A Struts-based Webshop for Small and Medium-sized Enterprises
: Electronic commerce becomes an important competitive advantage for small and medium-sized enterprises. Those enterprises therefore need a tool to easily exhibit and sell their pr...
Nicolas Werro, Henrik Stormer, Daniel Frauchiger, ...
SIGMOD
2006
ACM
232views Database» more  SIGMOD 2006»
14 years 8 months ago
To search or to crawl?: towards a query optimizer for text-centric tasks
Text is ubiquitous and, not surprisingly, many important applications rely on textual data for a variety of tasks. As a notable example, information extraction applications derive...
Panagiotis G. Ipeirotis, Eugene Agichtein, Pranay ...