Sciweavers

4190 search results - page 818 / 838
» Type Class Directives
Sort
View
I3E
2003
77views Business» more  I3E 2003»
13 years 10 months ago
Who are the Internet Content Providers?
: The Internet continues its growth as a medium for the sale of goods and services – and yet, although it would seem that digital content was one of the most obvious products for...
Cornelia C. Krueger, Paula M. C. Swatman
LEGE
2003
107views Education» more  LEGE 2003»
13 years 10 months ago
Design Considerations for an ELeGI Portal
ELeGI, the European Learning Grid Infrastructure, has the ambitious goal of fostering effective learning and knowledge construction through the dynamic provision of service-based ...
Colin Allison, Rosa Michaelson
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
13 years 10 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith
USENIX
2003
13 years 10 months ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
VCIP
2003
147views Communications» more  VCIP 2003»
13 years 10 months ago
An objective method for combining multiple subjective data sets
International recommendations for subjective video quality assessment (e.g., ITU-R BT.500-11) include specifications for how to perform many different types of subjective tests. I...
Margaret H. Pinson, Stephen Wolf