Sciweavers

1147 search results - page 106 / 230
» Transformation of Access Rights
Sort
View
PE
2007
Springer
112views Optimization» more  PE 2007»
13 years 8 months ago
Design and analysis of adaptive strategies for locating internet-based servers in MANETs
A critical problem in providing Internet access to Mobile Ad Hoc Networks (MANETs) is how the mobile hosts can locate Internet-based servers efficiently in a dynamic, unstructure...
Hongbo Jiang, Shudong Jin
IEEEARES
2010
IEEE
13 years 7 months ago
A New DRM Architecture with Strong Enforcement
—We propose a new DRM architecture that utilizes a two-step enforcement process to enable strong security even in the case of a compromised DRM viewer. This is achieved by using ...
Sascha Müller, Stefan Katzenbeisser
DATESO
2010
184views Database» more  DATESO 2010»
13 years 6 months ago
iXUPT: Indexing XML Using Path Templates
The XML format has become the standard for data exchange because it is self-describing and it stores not only information but also the relationships between data. Therefore it is u...
Tomás Bartos, Ján Kasarda
MICCAI
2005
Springer
14 years 9 months ago
Deformable Registration of Diffusion Tensor MR Images with Explicit Orientation Optimization
In this paper, we present a novel deformable registration algorithm for diffusion tensor MR images that enables explicit optimization of tensor reorientation. The optimization see...
Hui Zhang 0005, Paul A. Yushkevich, James C. Gee
CVIU
2007
240views more  CVIU 2007»
13 years 8 months ago
Objective evaluation of approaches of skin detection using ROC analysis
Skin detection is an important indicator of human presence and actions in many domains, including interaction, interfaces and security. It is commonly performed in three steps: tr...
Stephen Schmugge, Sriram Jayaram, Min C. Shin, Leo...