Sciweavers

347 search results - page 38 / 70
» Overview of INEX 2005
Sort
View
ITRUST
2005
Springer
14 years 1 months ago
A Representation Model of Trust Relationships with Delegation Extensions
Abstract. Logic languages establish a formal framework to solve authorization and delegation conflicts. However, we consider that a visual representation is necessary since graphs...
Isaac Agudo, Javier Lopez, José A. Monteneg...
ITRUST
2005
Springer
14 years 1 months ago
Trust Management Survey
Trust is an important tool in human life, as it enables people to cope with the uncertainty caused by the free will of others. Uncertainty and uncontrollability are also issues in ...
Sini Ruohomaa, Lea Kutvonen
IWDW
2005
Springer
14 years 1 months ago
The Return of the Sensitivity Attack
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum ...
Pedro Comesaña, Luis Pérez-Freire, F...
IWDW
2005
Springer
14 years 1 months ago
A Survey of Watermarking Security
Digital watermarking studies have always been driven by the improvement of robustness. Most of articles of this field deal with this criterion, presenting more and more impressive...
Teddy Furon
KES
2005
Springer
14 years 1 months ago
OntoExtractor: A Fuzzy-Based Approach in Clustering Semi-structured Data Sources and Metadata Generation
This paper describes a theoretical approach on data mining, information classifying and a global overview of our OntoExtractor application, concerning the analysis of incoming data...
Zhan Cui, Ernesto Damiani, Marcello Leida, Marco V...