Sciweavers

1744 search results - page 322 / 349
» The Steganographic File System
Sort
View
125
Voted
ACSC
2004
IEEE
15 years 7 months ago
Java Implementation Verification Using Reverse Engineering
An approach to system verification is described in which design artefacts produced during forward engineering are automatically compared to corresponding artefacts produced during...
David J. A. Cooper, Benjamin Khoo, Brian R. von Ko...
ISMIR
2000
Springer
225views Music» more  ISMIR 2000»
15 years 7 months ago
Beyond VARIATIONS: Creating a Digital Music Library
This presentation will focus primarily on work being done at Indiana University in the area of digital music libraries, with some discussion of related efforts. Indiana University...
Jon W. Dunn
146
Voted
ISMIR
2000
Springer
146views Music» more  ISMIR 2000»
15 years 7 months ago
Perceptual and Cognitive Applications in Music Information Retrieval
Music librarians and cataloguers have traditionally created indexes that allow users to access musical works using standard reference information, such as the name of the composer...
David Huron
138
Voted
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
15 years 7 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
154
Voted
ICIA
2007
15 years 6 months ago
Improving Intelligent Assistants for Desktop Activities
Tasks have been identified as playing an important role to knowledge workers as high-level units for organizing their information. TaskTracer is a task-aware desktop system that l...
Simone Stumpf, Margaret M. Burnett, Thomas G. Diet...