Sciweavers

2237 search results - page 325 / 448
» Storing information with extractors
Sort
View
MM
2000
ACM
123views Multimedia» more  MM 2000»
14 years 3 months ago
Mediacaptain - an interface for browsing streaming media
The increase of bandwidth and streaming technology has made video on the Web the current “killer-app” of the dot-com world. However, users still face many problems. Users have...
Florian Mueller
SIGECOM
2000
ACM
132views ECommerce» more  SIGECOM 2000»
14 years 3 months ago
What is actually taking place on web sites: e-commerce lessons from web server logs
A prime business concern is knowing your customer. One legacy carried into the present from the earliest NCSA web servers is web server logs. While there are more powerful user tr...
Mark Rosenstein
ACISP
2000
Springer
14 years 3 months ago
Cryptanalysis of the m-Permutation Protection Schemes
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP'98, Fung and Gray proposed an −m permutation protecti...
Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
ADL
2000
Springer
251views Digital Library» more  ADL 2000»
14 years 3 months ago
Efficient Similarity Search in Digital Libraries
Digital libraries are a core information technology. When the stored data is complex, e.g. high-resolution images or molecular protein structures, simple query types like the exac...
Christian Böhm, Bernhard Braunmüller, Ha...
POPL
1999
ACM
14 years 3 months ago
Software Watermarking: Models and Dynamic Embeddings
Watermarking embeds a secret message into a cover message. In media watermarking the secret is usually a copyright notice and the cover a digital image. Watermarking an object dis...
Christian S. Collberg, Clark D. Thomborson