Sciweavers

635 search results - page 99 / 127
» Social Aspects of Information Security
Sort
View
GRID
2007
Springer
14 years 3 months ago
Grid metadata management: Requirements and architecture
Abstract— Metadata annotations of Grid resources can potentially be used for a number of purposes, including accurate resource allocation to jobs, discovery of services, and prec...
Óscar Corcho, Pinar Alper, Paolo Missier, S...
DRM
2005
Springer
14 years 3 months ago
Statistical audio watermarking algorithm based on perceptual analysis
In this paper, we describe a novel statistical audio watermarking scheme. Under the control of the masking thresholds, watermark is embedded adaptively and transparently in the pe...
Xiaomei Quan, Hongbin Zhang
ICARIS
2004
Springer
14 years 3 months ago
Online Negative Databases
The benefits of negative detection for obscuring information are explored in the context of Artificial Immune Systems (AIS). AIS based on string matching have the potential for a...
Fernando Esponda, Elena S. Ackley, Stephanie Forre...
CORR
2006
Springer
100views Education» more  CORR 2006»
13 years 9 months ago
Authorised Translations of Electronic Documents
A concept is proposed to extend authorised translations of documents to electronically signed, digital documents. Central element of the solution is an electronic seal, embodied a...
Jan Piechalski, Andreas U. Schmidt
AIL
2004
111views more  AIL 2004»
13 years 9 months ago
Anonymity and software agents: An interdisciplinary challenge
Software agents that play a role in E-commerce and E-government applications involving the Internet often contain information about the identity of their human user such as credit ...
Frances M. T. Brazier, Anja Oskamp, Corien Prins, ...