Sciweavers

6137 search results - page 979 / 1228
» Securing Collaborative Applications
Sort
View
ICPR
2008
IEEE
16 years 3 months ago
Refining PTZ camera calibration
Due to the increased need for security and surveillance, PTZ cameras are now being widely used in many domains. Therefore, it is very important for the applications like video mos...
Hassan Foroosh, Imran N. Junejo
WWW
2003
ACM
16 years 3 months ago
A Web Service Market Model based on Dependencies
The construction of composite Web Services from service fragments requires semantic descriptions of service offers and service requests. We propose the use of dependencies as a mo...
Robert Tolksdorf, Christian Bizer, Ralf Heese
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
16 years 3 months ago
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
MULTI2 is the block cipher used in the ISDB standard for scrambling digital multimedia content. MULTI2 is used in Japan to secure multimedia broadcasting, including recent applicat...
Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan...
KDD
2003
ACM
113views Data Mining» more  KDD 2003»
16 years 2 months ago
Using randomized response techniques for privacy-preserving data mining
Privacy is an important issue in data mining and knowledge discovery. In this paper, we propose to use the randomized response techniques to conduct the data mining computation. S...
Wenliang Du, Zhijun Zhan
CHI
2007
ACM
16 years 2 months ago
The impact of digital iconic realism on anonymous interactants' mobile phone communication
In this paper, I describe progress in research designed to explore the effect of the combination of behavioral and visual fidelity of avatars on users' social presence in syn...
Sin-Hwa Kang