Sciweavers

24188 search results - page 240 / 4838
» Computing on Encrypted Data
Sort
View
132
Voted
CSREASAM
2010
15 years 1 months ago
A Security Measure Selection Scheme with Consideration of Potential Lawsuits
- Information breaches on ITC systems may result in lawsuits. Information security countermeasures such as firewalls, data encryption, and so on, are essential; protecting systems ...
Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshi...
113
Voted
ESSCIRC
2011
93views more  ESSCIRC 2011»
14 years 3 months ago
12% Power reduction by within-functional-block fine-grained adaptive dual supply voltage control in logic circuits with 42 volta
— Within-functional-block fine-grained adaptive dual supply voltage control (FADVC) is proposed to reduce the power of CMOS logic circuits. Both process and design variations wi...
Atsushi Muramatsu, Tadashi Yasufuku, Masahiro Nomu...
136
Voted
IJMI
2007
140views more  IJMI 2007»
15 years 3 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
145
Voted
SCIENTOMETRICS
2010
122views more  SCIENTOMETRICS 2010»
15 years 2 months ago
A comparison of bibliometric indicators for computer science scholars and journals on Web of Science and Google Scholar
Abstract. Given the current availability of different bibliometric indicators and of production and citation data sources, the following two questions immediately arise: do the in...
Massimo Franceschet
114
Voted
SOFSEM
2001
Springer
15 years 8 months ago
How Can Computer Science Contribute to Knowledge Discovery?
Knowledge discovery, that is, to analyze a given massive data set and derive or discover some knowledge from it, has been becoming a quite important subject in several fields incl...
Osamu Watanabe