Sciweavers

779 search results - page 140 / 156
» An Asynchronous Distributed Component Model and Its Semantic...
Sort
View
156
Voted
ISSA
2008
15 years 3 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche
UAI
2000
15 years 3 months ago
Utilities as Random Variables: Density Estimation and Structure Discovery
Decision theory does not traditionally include uncertainty over utility functions. We argue that the a person's utility value for a given outcome can be treated as we treat o...
Urszula Chajewska, Daphne Koller
ECEH
2007
133views Healthcare» more  ECEH 2007»
15 years 3 months ago
Goals and Challenges for the Realization of a European wide eHealth Infrastructure
: A number of Electronic Health Record (EHR) standards and frameworks have been developed to assist with the interoperability and integration of distributed EHR information. Ideall...
Andreas Thiel, Marco Eichelberg, Berthold B. Wein,...
FM
2006
Springer
153views Formal Methods» more  FM 2006»
15 years 5 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
135
Voted
IBPRIA
2007
Springer
15 years 8 months ago
Optimally Discriminant Moments for Speckle Detection in Real B-Scan Images
Detection of speckle in ultrasound (US) images has been regarded as an important research topic in US imaging, mainly focusing on two specific applications: improving signal to no...
Robert Marti, Joan Martí, Jordi Freixenet, ...