Sciweavers

1081 search results - page 170 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
15 years 10 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
HICSS
2003
IEEE
140views Biometrics» more  HICSS 2003»
15 years 9 months ago
Pervasive Real-Time IT as a Disruptive Technology for the IS Field
This paper builds on ideas in a recent paper which argued that the core subject matter of the IS field should not be “the IT artifact” (as suggested by Orlikowski and Iacono [...
Steven Alter
IEEEAMS
2003
IEEE
15 years 9 months ago
Navigating in the Storm: Using Astrolabe for Distributed Self-Configuration, Monitoring and Adaptation
The dramatic growth of computer networks creates both an opportunity and a daunting distributed computing problem for users seeking to build applications that can configure themse...
Kenneth P. Birman, Robbert van Renesse, James Kauf...
SC
2005
ACM
15 years 9 months ago
Identity Boxing: A New Technique for Consistent Global Identity
Today, users of the grid may easily authenticate themselves to computing resources around the world using a public key security infrastructure. However, users are forced to employ...
Douglas Thain
VR
2009
IEEE
188views Virtual Reality» more  VR 2009»
15 years 11 months ago
Crafting Personalized Facial Avatars Using Editable Portrait and Photograph Example
Computer-generated facial avatars have been increasingly used in a variety of virtual reality applications. Emulating the real-world face sculpting process, we present an interact...
Tanasai Sucontphunt, Zhigang Deng, Ulrich Neumann