Sciweavers

858 search results - page 146 / 172
» One Is Enough!
Sort
View
SWS
2004
ACM
14 years 2 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
CCS
2004
ACM
14 years 2 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon
ECCV
2004
Springer
14 years 2 months ago
Ultrasound Stimulated Vibro-acoustography
ABSTRACT We describe theoretical principles of an imaging modality that uses the acoustic response of an object to a highly localized dynamic radiation force of an ultrasound field...
James F. Greenleaf, Mostafa Fatemi, Marek Belohlav...
ERCIMDL
2004
Springer
184views Education» more  ERCIMDL 2004»
14 years 2 months ago
A Comparison of Text and Shape Matching for Retrieval of Online 3D Models
Because of recent advances in graphics hard- and software, both the production and use of 3D models are increasing at a rapid pace. As a result, a large number of 3D models have be...
Patrick Min, Michael M. Kazhdan, Thomas A. Funkhou...
ESORICS
2004
Springer
14 years 2 months ago
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. In this model, a service prov...
Einar Mykletun, Maithili Narasimha, Gene Tsudik