Sciweavers

1988 search results - page 359 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
DRMTICS
2005
Springer
14 years 2 months ago
The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?
This chapter overviews the legal issues arising from the modification of the Sony PlayStation console under Australian Copyright Law - the so called anti-circumvention provisions....
Brian Fitzgerald
ISI
2008
Springer
13 years 8 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
CVPR
2009
IEEE
1133views Computer Vision» more  CVPR 2009»
15 years 3 months ago
Hierarchical Spatio-Temporal Context Modeling for Action Recognition
The problem of recognizing actions in realistic videos is challenging yet absorbing owing to its great potentials in many practical applications. Most previous research is limit...
Jintao Li, Ju Sun, Loong Fah Cheong, Shuicheng Yan...
DSN
2009
IEEE
14 years 3 months ago
Stretching gossip with live streaming
Gossip-based information dissemination protocols are considered easy to deploy, scalable and resilient to network dynamics. They are also considered highly flexible, namely tunab...
Davide Frey, Rachid Guerraoui, Anne-Marie Kermarre...
ITNG
2008
IEEE
14 years 3 months ago
Parallel FFT Algorithms on Network-on-Chips
This paper presents several parallel FFT algorithms with different degree of communication overhead for multiprocessors in Network-on-Chip(NoC) environment. Three different method...
Jun Ho Bahn, Jungsook Yang, Nader Bagherzadeh