Sciweavers

1927 search results - page 343 / 386
» An Access Control Model for Location based Services
Sort
View
HPDC
2010
IEEE
14 years 11 months ago
Resource provisioning with budget constraints for adaptive applications in cloud environments
The recent emergence of clouds is making the vision of utility computing realizable, i.e. computing resources and services can be delivered, utilized, and paid for as utilities su...
Qian Zhu, Gagan Agrawal
DSN
2011
IEEE
13 years 9 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...
IHI
2012
353views Healthcare» more  IHI 2012»
13 years 5 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad
CRYPTO
2001
Springer
153views Cryptology» more  CRYPTO 2001»
15 years 2 months ago
Universally Composable Commitments
d Abstract) Ran Canetti and Marc Fischlin Abstract. We propose a new security measure for commitment protocols, called Universally Composable (UC) Commitment. The measure guarantee...
Ran Canetti, Marc Fischlin
DAWAK
2006
Springer
15 years 1 months ago
Integrating Different Grain Levels in a Medical Data Warehouse Federation
Healthcare organizations practicing evidence-based medicine strive to unite their data resources in order to achieve a wider knowledge base for sophisticated research and matured d...
Marko Banek, A. Min Tjoa, Nevena Stolba