Sciweavers

651 search results - page 121 / 131
» Negative Database for Data Security
Sort
View
ACMSE
2005
ACM
14 years 1 months ago
On developing a simple in-house digital library archive
Digital libraries (DLs) have become a major focus of information technology resources for organizations from academia, to the US Department of Defense to the archeological efforts...
Eric L. Brown, Luis G. Velazco, G. Kirksey, S. Ram...
DEXAW
2003
IEEE
108views Database» more  DEXAW 2003»
14 years 1 months ago
A Protocol for Programmable Smart Cards
This paper presents an open protocol for interoperability across multi-vendor programmable smart cards. It allows exposition of on-card storage and cryptographic services to host ...
Tommaso Cucinotta, Marco Di Natale, David Corcoran
DEXAW
2003
IEEE
94views Database» more  DEXAW 2003»
14 years 1 months ago
Experiences Running a Web Anonymising Service
The research project “AN.ON – Anonymity online” focuses on developing and providing a web anonymising service. This service provides anonymity and unobservability against ex...
Claudia Golembiewski, Marit Hansen, Sandra Steinbr...
CIKM
2009
Springer
14 years 10 days ago
Scalable continuous range monitoring of moving objects in symbolic indoor space
Indoor spaces accommodate large populations of individuals. The continuous range monitoring of such objects can be used as a foundation for a wide variety of applications, e.g., s...
Bin Yang 0002, Hua Lu, Christian S. Jensen
JMM2
2006
149views more  JMM2 2006»
13 years 7 months ago
Invariant Robust 3-D Face Recognition based on the Hilbert Transform in Spectral Space
One of the main objectives of face recognition is to determine whether an acquired face belongs to a reference database and to subsequently identify the corresponding individual. F...
Eric Paquet, Marc Rioux