Sciweavers

61 search results - page 12 / 13
» Security and privacy issues in the Portable Document Format
Sort
View
MOBISYS
2008
ACM
14 years 7 months ago
Trustworthy and personalized computing on public kiosks
Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a publi...
Scott Garriss, Ramón Cáceres, Stefan...
AGENTS
2000
Springer
13 years 12 months ago
MAS Infrastructure: Definitions, Needs and Prospects
This paper attempts to articulate the general role of infrastructure for multi-agent systems (MAS), and why infrastructure is a particularly critical issue if we are to increase th...
Les Gasser
CCS
2001
ACM
14 years 1 days ago
Taking the Copy Out of Copyright
Under current U.S. law and common understanding, the fundamental right granted by copyright is the right of reproduction – of making copies. Indeed, the very word “copyright”...
Ernest Miller, Joan Feigenbaum
WWW
2003
ACM
14 years 8 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski
SPEECH
2010
94views more  SPEECH 2010»
13 years 2 months ago
Predicting the phonetic realizations of word-final consonants in context - A challenge for French grapheme-to-phoneme converters
One of the main problems in developing a text-to-speech (TTS) synthesizer for French lies in grapheme-to-phoneme conversion. Automatic converters produce still too many errors in ...
Josafá de Jesus Aguiar Pontes, Sadaoki Furu...