Sciweavers

ESORICS
2007
Springer
15 years 6 months ago
Graphical Password Authentication Using Cued Click Points
We propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of image...
Sonia Chiasson, Paul C. van Oorschot, Robert Biddl...
ACSW
2007
15 years 1 months ago
A Data Warehouse Architecture for Clinical Data Warehousing
Data warehousing methodologies share a common set of tasks, including business requirements analysis, data design, architectural design, implementation and deployment. Clinical da...
Tony R. Sahama, Peter R. Croll
ISPEC
2007
Springer
15 years 6 months ago
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper)
Abstract. With the increased use of Internet and information technology all over the world, there is an increased amount of criminal activities that involve computing and digital d...
Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
ACSW
2007
15 years 1 months ago
Autonomic System Management in Mobile Grid Environments
Mobile device integration in grid environments is a challenge for many researchers. Due to the transient nature of mobile devices, service management is a critical, but often over...
Michael Messig, Andrzej Goscinski
ACSW
2007
15 years 1 months ago
An Automated System for Conversion of Clinical Notes into SNOMED Clinical Terminology
The automatic conversion of free text into a medical ontology can allow computational access to important information currently locked within clinical notes and patient reports. T...
Jon Patrick, Yefeng Wang, Peter Budd
Security Privacy
Top of PageReset Settings