Sciweavers

497 search results - page 85 / 100
» Privacy Enhanced Technologies: Methods - Markets - Misuse
Sort
View
IH
2001
Springer
13 years 12 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
JAVA
1999
Springer
13 years 11 months ago
Practical Guidelines for Boosting Java Server Performance
As Java technology matures, an increasing number of applications that have traditionally been the domain of languages such as C++ are implemented in Java. Many of these applicatio...
Reinhard Klemm
CIT
2006
Springer
13 years 11 months ago
A Contention Window Based Differentiation Mechanism for providing QoS in Wireless LANs
Running real time applications over wireless LANs is becoming common place. These applications require QoS. But the most widely used wireless LAN, IEEE 802.11, does not have QoS s...
Mayank Mishra, Anirudha Sahoo
CLEF
2006
Springer
13 years 11 months ago
Vocabulary Reduction and Text Enrichment at WebCLEF
Nowadays, cross-lingual Information Retrieval (IR) is one of the greatest challenges to deal with. Besides, one of the most important issues in IR consists in the corpus vocabular...
Franco Rojas López, Héctor Jim&eacut...
AVI
2008
13 years 9 months ago
VCode and VData: illustrating a new framework for supporting the video annotation workflow
Digital tools for annotation of video have the promise to provide immense value to researchers in disciplines ranging from psychology to ethnography to computer science. With trad...
Joey Hagedorn, Joshua M. Hailpern, Karrie Karahali...