Sciweavers

374 search results - page 15 / 75
» Rights Protection for Relational Data
Sort
View
DRM
2005
Springer
14 years 1 months ago
Fairer usage contracts for DRM
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Alapan Arnab, Andrew Hutchison
ISM
2005
IEEE
153views Multimedia» more  ISM 2005»
14 years 1 months ago
Application Layer Error Correction Scheme for Video Header Protection on Wireless Network
In wireless video streaming application, video information may be corrupted by a noisy channel. By introducing error resilience and error concealment techniques, many researchers ...
Chia-Ho Pan, I-Hsien Lee, Sheng-Chieh Huang, Chih-...
ISI
2008
Springer
13 years 7 months ago
Information sharing and privacy protection of terrorist or criminal social networks
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Christopher C. Yang
SOSP
2005
ACM
14 years 4 months ago
Mondrix: memory isolation for linux using mondriaan memory protection
This paper presents the design and an evaluation of Mondrix, a version of the Linux kernel with Mondriaan Memory Protection (MMP). MMP is a combination of hardware and software th...
Emmett Witchel, Junghwan Rhee, Krste Asanovic
COMPUTER
2004
115views more  COMPUTER 2004»
13 years 7 months ago
Data and Information as Property
and services. Abstract goods and services such as pictures, speech, and music--which have in the past been relatively awkward to deal with as analog data--have, through digital tec...
W. Neville Holmes