Towards a Conceptual Framework for Digital Contract Composition and Fulfilment
暂无分享,去创建一个
M. Steinebach | J. Dittmann | Susanne Guth | A. Lang | Uwe Wessely | Stefan Thiemert | Stefan Eichner | Dirk Albrecht
[1] Miodrag Potkonjak,et al. Effective iterative techniques for fingerprinting design IP , 1999, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[2] Jaap Gordijn,et al. Value-based requirements engineering: exploring innovative e-commerce ideas , 2003, Requirements Engineering.
[3] Stephan Baumann,et al. MUSIC SIMILARITY ANALYSIS IN A P2P ENVIRONMENT , 2003 .
[4] François Pachet,et al. Representing Musical Genre: A State of the Art , 2003 .
[5] Uwe Zdun,et al. A contract and rights management framework design for interacting brokers , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[6] Rüdiger Grimm,et al. Peer-to-peer music-sharing with profit but without copy protection , 2002, Second International Conference on Web Delivering of Music, 2002. WEDELMUSIC 2002. Proceedings..
[7] Jianzhong Li,et al. A Kind of Content-Based Music Information Retrieval Method in Peer-to-peer Environment , 2002, ISMIR.
[8] Jechang Jeong,et al. Robust image watermarking scheme resilient to desynchronization attacks , 2002, IS&T/SPIE Electronic Imaging.
[9] Susanne Guth,et al. Electronic Rights Enforcement for Learning Media , 2002 .
[10] J. Stephen Downie,et al. Interdisciplinary Communities and Research Issues in Music Information Retrieval , 2002, ISMIR.
[11] Paris Smaragdis,et al. Combining Musical and Cultural Features for Intelligent Style Detection , 2002, ISMIR.
[12] Stephan Baumann,et al. Super-convenience for Non-musicans: Querying MP3 and the Semantic Web , 2002, ISMIR.
[13] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[14] Renato Iannella,et al. Digital Rights Management (DRM) Architectures , 2001, D Lib Mag..
[15] Silvia Pfeiffer,et al. Formalisation of MPEG-1 compressed domain audio features , 2001 .
[16] Eric Allamanche,et al. Content-based Identification of Audio Material Using MPEG-7 Low Level Description , 2001, ISMIR.
[17] Michal Morciniec,et al. Towards Regulating Electronic Communities with Contracts , 2001 .
[18] Jörg Schwenk,et al. Combining digital watermarks and collusion secure fingerprints for digital images , 2000, J. Electronic Imaging.
[19] Ingemar J. Cox,et al. Watermarking applications and their properties , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[20] Josep Domingo-Ferrer,et al. Simple collusion-secure fingerprinting schemes for images , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).
[21] Katarina Stanoevska-Slabeva,et al. Supporting Market Transaction through XML Contracting Containers , 2000 .
[22] Mauro Barni,et al. Geometric-invariant robust watermarking through constellation matching in the frequency domain , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[23] Ching-Yung Lin. Public Watermarking Surviving General Scaling and Cropping: An Application for Print-and-Scan Process , 2000 .
[24] Shih-Fu Chang,et al. Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process , 2000 .
[25] Beth Logan,et al. Mel Frequency Cepstral Coefficients for Music Modeling , 2000, ISMIR.
[26] Jun Sekine,et al. Digital-Ticket-Controlled Digital Ticket Circulation , 1999, USENIX Security Symposium.
[27] Bernd Girod,et al. On the robustness and imperceptibility of digital fingerprints , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[28] Ton Kalker,et al. Video watermarking system for broadcast monitoring , 1999, Electronic Imaging.
[29] Jörg Schwenk,et al. Combining digital watermarks and collusion-secure fingerprints for digital images , 1999, Electronic Imaging.
[30] M. Holbrook. Consumer Value: A Framework for Analysis and Research , 1999 .
[31] Thierry Pun,et al. Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.
[32] Ronald L. Rivest,et al. Electronic Lottery Tickets as Micropayments , 1997, Financial Cryptography.
[33] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.