Sciweavers

24188 search results - page 319 / 4838
» Computing on Encrypted Data
Sort
View
GBRPR
2009
Springer
15 years 10 months ago
On Computing Canonical Subsets of Graph-Based Behavioral Representations
The collection of behavior protocols is a common practice in human factors research, but the analysis of these large data sets has always been a tedious and time-consuming process....
Walter C. Mankowski, Peter Bogunovich, Ali Shokouf...
EDOC
2006
IEEE
15 years 10 months ago
Enterprise Computing Systems as Information Factories
The analysis, and eventual approval or rejection, of new enterprise information technology (IT) initiatives often proceeds on the basis of informal estimates of return on investme...
K. Mani Chandy, Lu Tian, Daniel M. Zimmerman
ISMDA
2005
Springer
15 years 9 months ago
Simultaneous Scheduling of Replication and Computation for Bioinformatic Applications on the Grid
Abstract. One of the first motivations of using grids comes from applications managing large data sets like for example in High Energy Physic or Life Sciences. To improve the glob...
Frederic Desprez, Antoine Vernois, Christophe Blan...
CARS
2003
15 years 5 months ago
Does incorrect computer prompting affect human decision making? A case study in mammography
The goal of the data collection and analyses described in this paper was to investigate the effects of incorrect output from a CAD tool on the reliability of the decisions of its ...
Eugenio Alberdi, Andrey Povyakalo, Lorenzo Strigin...
JUCS
2010
162views more  JUCS 2010»
15 years 2 months ago
Enabling Personal Privacy for Pervasive Computing Environments
: Protection of personal data in the Internet is already a challenge today. Users have to actively look up privacy policies of websites and decide whether they can live with the te...
Susana Alcalde Bagüés, Andreas Zeidler...