Found: 435
Select item for more details and to access through your institution.
HIGH Yield: Case study marks out path for cross-function project management and problem solving to flourish.
- Published in:
- Lean & Six Sigma Review, 2024, v. 23, n. 4, p. 8
- By:
- Publication type:
- Article
Summaries.
- Published in:
- Tudomanyos es Muszaki Tajekoztatas, 2011, v. 58, n. 10, p. 418
- Publication type:
- Article
Online videotárak az oktatás-kutatás szolgálatában.
- Published in:
- Tudomanyos es Muszaki Tajekoztatas, 2011, v. 58, n. 10, p. 430
- By:
- Publication type:
- Article
Szerzöi jogi visszaélések az elektronikus dokumentumok világában.
- Published in:
- Tudomanyos es Muszaki Tajekoztatas, 2007, v. 54, n. 3, p. 103
- By:
- Publication type:
- Article
Parallel transmission model for real-time multi-source streaming of multimedia data in scalable networks.
- Published in:
- Computer Systems Science & Engineering, 2007, v. 22, n. 3, p. 125
- By:
- Publication type:
- Article
Innovation vs. Control.
- Published in:
- Government Technology, 2015, v. 28, n. 4, p. 20
- By:
- Publication type:
- Article
STRENGTH IN NUMBERS.
- Published in:
- Government Technology, 2015, v. 28, n. 1, p. 30
- By:
- Publication type:
- Article
Appliance Helps Researchers Share Large Files.
- Published in:
- Bio-IT World, 2006, v. 5, n. 4, p. 39
- By:
- Publication type:
- Article
Circular meaningful shares based (k, n) two in one image secret sharing scheme for multiple secret images.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 21, p. 28601, doi. 10.1007/s11042-018-6019-0
- By:
- Publication type:
- Article
Enhancing security and privacy of images on cloud by histogram shifting and secret sharing.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 13, p. 17285, doi. 10.1007/s11042-017-5306-5
- By:
- Publication type:
- Article
A novel secret image sharing scheme using large primes.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 10, p. 11903, doi. 10.1007/s11042-017-4841-4
- By:
- Publication type:
- Article
Selective scalable secret image sharing with verification.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 1, p. 1, doi. 10.1007/s11042-015-3011-9
- By:
- Publication type:
- Article
Secret image sharing with smaller shadow sizes for general access structures.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 21, p. 13913, doi. 10.1007/s11042-015-2734-y
- By:
- Publication type:
- Article
General construction for XOR-based visual cryptography and its extended capability.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 21, p. 13883, doi. 10.1007/s11042-016-3250-4
- By:
- Publication type:
- Article
Reversible secret image sharing scheme in encrypted images.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 21, p. 13931, doi. 10.1007/s11042-016-3844-x
- By:
- Publication type:
- Article
Self-adaptive morphable model based collaborative multi-view 3d face reconstruction in visual sensor network.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 18, p. 11469, doi. 10.1007/s11042-015-2864-2
- By:
- Publication type:
- Article
A cheating-prevention mechanism for hierarchical secret-image-sharing using robust watermarking.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 13, p. 7855, doi. 10.1007/s11042-015-2701-7
- By:
- Publication type:
- Article
Methodology and implementation for tracking the file sharers using BitTorrent.
- Published in:
- Multimedia Tools & Applications, 2015, v. 74, n. 1, p. 271, doi. 10.1007/s11042-013-1760-x
- By:
- Publication type:
- Article
A novel ( n, t, n) secret image sharing scheme without a trusted third party.
- Published in:
- Multimedia Tools & Applications, 2014, v. 72, n. 3, p. 2195, doi. 10.1007/s11042-013-1510-0
- By:
- Publication type:
- Article
Fast shared boosting for large-scale concept detection.
- Published in:
- Multimedia Tools & Applications, 2012, v. 60, n. 2, p. 389, doi. 10.1007/s11042-010-0607-y
- By:
- Publication type:
- Article
CRIM's content-based audio copy detection system for TRECVID 2009.
- Published in:
- Multimedia Tools & Applications, 2012, v. 60, n. 2, p. 371, doi. 10.1007/s11042-010-0608-x
- By:
- Publication type:
- Article
Scene extraction system for video clips using attached comment interval and pointing region.
- Published in:
- Multimedia Tools & Applications, 2011, v. 54, n. 1, p. 7, doi. 10.1007/s11042-010-0531-1
- By:
- Publication type:
- Article
An image authentication scheme based on digital watermarking and image secret sharing.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 597, doi. 10.1007/s11042-010-0520-4
- By:
- Publication type:
- Article
An attribute-based lightweight cloud data access control using hypergraph structure.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 8, p. 6040, doi. 10.1007/s11227-019-03119-7
- By:
- Publication type:
- Article
speedTrust: a super peer-guaranteed trust model in hybrid P2P networks.
- Published in:
- Journal of Supercomputing, 2018, v. 74, n. 6, p. 2553, doi. 10.1007/s11227-018-2286-9
- By:
- Publication type:
- Article
Trust model at service layer of cloud computing for educational institutes.
- Published in:
- Journal of Supercomputing, 2016, v. 72, n. 1, p. 58, doi. 10.1007/s11227-015-1488-7
- By:
- Publication type:
- Article
A trust value-based scheme for efficient contents sharing over mobile P2P networks.
- Published in:
- Journal of Supercomputing, 2015, v. 71, n. 6, p. 2177, doi. 10.1007/s11227-015-1393-0
- By:
- Publication type:
- Article
Distributed optimization Grid resource discovery.
- Published in:
- Journal of Supercomputing, 2015, v. 71, n. 1, p. 87, doi. 10.1007/s11227-014-1289-4
- By:
- Publication type:
- Article
A secure file sharing service for distributed computing environments.
- Published in:
- Journal of Supercomputing, 2014, v. 67, n. 3, p. 691, doi. 10.1007/s11227-013-0975-y
- By:
- Publication type:
- Article
Energy efficient peer-to-peer file sharing.
- Published in:
- Journal of Supercomputing, 2012, v. 62, n. 3, p. 1167, doi. 10.1007/s11227-011-0602-8
- By:
- Publication type:
- Article
Convert-and-Deliver: a scalable multicast optical cross-connect with reduced power splitting fan-out.
- Published in:
- Journal of Supercomputing, 2012, v. 62, n. 3, p. 1189, doi. 10.1007/s11227-011-0565-9
- By:
- Publication type:
- Article
SAPDS: self-healing attribute-based privacy aware data sharing in cloud.
- Published in:
- Journal of Supercomputing, 2012, v. 62, n. 1, p. 431, doi. 10.1007/s11227-011-0727-9
- By:
- Publication type:
- Article
Failure detectors as type boosters.
- Published in:
- Distributed Computing, 2008, v. 20, n. 5, p. 343, doi. 10.1007/s00446-007-0043-z
- By:
- Publication type:
- Article
Riassunti/Summaries.
- Published in:
- 2011
- Publication type:
- Abstract
Consumer File Sharing of Motion Pictures.
- Published in:
- Journal of Marketing, 2007, v. 71, n. 4, p. 1, doi. 10.1509/jmkg.71.4.1
- By:
- Publication type:
- Article
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies.
- Published in:
- IEEE Transactions on Software Engineering, 2008, v. 34, n. 1, p. 50, doi. 10.1109/TSE.2007.70742
- By:
- Publication type:
- Article
USA: Reasonable expectation of privacy of a Dropbox account.
- Published in:
- Computer Law Review International, 2023, v. 24, n. 1, p. 29, doi. 10.9785/cri-2023-240106
- Publication type:
- Article
GAZELA: ASESOR DIGITAL DE REDES SOCIALES PARA ADOLESCENTES.
- Published in:
- El Profesional de la Información, 2012, v. 21, n. 5, p. 514, doi. 10.3145/epi.2012.sep.11
- By:
- Publication type:
- Article
Digital Rights Management System and Administration: A Wake-up Call for Nigeria!
- Published in:
- Law & Development Review, 2018, v. 11, n. 2, p. 609, doi. 10.1515/ldr-2018-0031
- By:
- Publication type:
- Article
Predicting the Determinants of Users' Intentions for Using YouTube to Share Video: Moderating Gender Effects.
- Published in:
- CyberPsychology, Behavior & Social Networking, 2010, v. 13, n. 2, p. 141, doi. 10.1089/cyber.2009.0105
- By:
- Publication type:
- Article
A Digital Rights Management System Based on Cloud.
- Published in:
- Telkomnika, 2017, v. 15, n. 2, p. 671, doi. 10.12928/TELKOMNIKA.v15i2.5991
- By:
- Publication type:
- Article
Efficient Content Location Using Semantic Small World in Peer-to-Peer Networks.
- Published in:
- Telkomnika, 2013, v. 11, n. 2, p. 223, doi. 10.12928/telkomnika.v11i2.909
- By:
- Publication type:
- Article
A ESTRATÉGIA DISCUTIDA ATRAVÉS DE VARIÁVEIS DA ADMINISTRAÇÃO: PERGUNTAS E RESPOSTAS.
- Published in:
- Revista Pretexto, 2011, v. 12, n. 1, p. 55
- By:
- Publication type:
- Article
Achieving Dynamic Data Guarantee and Data Confidentiality of Public Auditing in Cloud Storage Service.
- Published in:
- Journal of Circuits, Systems & Computers, 2017, v. 26, n. 5, p. -1, doi. 10.1142/S0218126617500724
- By:
- Publication type:
- Article
BOOK REVIEW: The Business of Platforms.
- Published in:
- 2021
- By:
- Publication type:
- Book Review
Expertos audiovisuales frente a la crisis.
- Published in:
- Revista de Comunicación (1888198X), 2009, v. 2, n. 10, p. 26
- By:
- Publication type:
- Article
Internet Piracy as a hobby: what happens when the Brazilian Jeitinho meets television downloading?
- Published in:
- Global Media Journal: Australian Edition, 2011, v. 5, n. 1, p. 1
- By:
- Publication type:
- Article
Why I Don't Do Academic Social Media . . . or Do I?
- Published in:
- 2017
- By:
- Publication type:
- Editorial
Providing Services to Copyright Infringers: Roadshow Films Pty Ltd v iiNet Ltd.
- Published in:
- Sydney Law Review, 2011, v. 33, n. 4, p. 801
- By:
- Publication type:
- Article
"DEEMED DISTRIBUTION": HOW TALKING ABOUT MUSIC CAN VIOLATE COPYRIGHT LAW.
- Published in:
- Journal of Law, Technology & Policy, 2008, v. 2008, n. 2, p. 439
- By:
- Publication type:
- Article