Sciweavers

522 search results - page 56 / 105
» Necessary but Not Sufficient
Sort
View
DSN
2006
IEEE
13 years 11 months ago
Efficient High Hamming Distance CRCs for Embedded Networks
Cyclic redundancy codes (CRCs) are widely used in network transmission and data storage applications because they provide better error detection than lighter weight checksum techn...
Justin Ray, Philip Koopman
ACMICEC
2003
ACM
143views ECommerce» more  ACMICEC 2003»
13 years 11 months ago
Serviguration: towards online configurability of real-world services
Current eCommerce is still mainly characterized by the relatively straightforward trading of commodity goods. Nextgeneration efforts in worldwide information infrastructure, espec...
Ziv Baida, Hans Akkermans, Jaap Gordijn
FOIS
2008
13 years 9 months ago
Cognitive Context and Arguments from Ontologies for Learning
The deployment of learning resources on the web by different experts has resulted in the accessibility of multiple viewpoints about the same topics. In this work we assume that lea...
Christiana Panayiotou, Brandon Bennett
DBSEC
2006
115views Database» more  DBSEC 2006»
13 years 9 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
PAMI
2007
185views more  PAMI 2007»
13 years 7 months ago
Restoring 2D Content from Distorted Documents
—This paper presents a framework to restore the 2D content printed on documents in the presence of geometric distortion and nonuniform illumination. Compared with text-based docu...
Michael S. Brown, Mingxuan Sun, Ruigang Yang, Lin ...