Sciweavers

1949 search results - page 15 / 390
» Protective Interface Specifications
Sort
View
ICIP
2008
IEEE
14 years 1 months ago
H.264/AVC video scrambling for privacy protection
In this paper, we address the problem of privacy in video surveillance systems. More specifically, we consider the case of H.264/AVC which is the state-of-the-art in video coding....
Frédéric Dufaux, Touradj Ebrahimi
ISI
2006
Springer
13 years 7 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
ICDCS
1996
IEEE
13 years 11 months ago
Hidden Software Capabilities
: Software capabilities are a very convenient means to protect co-operating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacti...
Daniel Hagimont, Jacques Mossière, Xavier R...
ISORC
2002
IEEE
14 years 12 days ago
A Framework for Integrating the Real-Time Specification for Java and Java's Remote Method Invocation
This paper proposes a framework for integrating the Real-Time Specification for Java and Java's Remote Method Invocation. The concepts of real-time remote and distributed rea...
Andy J. Wellings, Roy Clark, E. Douglas Jensen, Do...
WWW
2006
ACM
14 years 8 months ago
Relaxed: on the way towards true validation of compound documents
To maintain interoperability in the Web environment it is necessary to comply with Web standards. Current specifications of HTML and XHTML languages define conformance conditions ...
Jirka Kosek, Petr Nálevka