Sciweavers

14078 search results - page 2586 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
IJNSEC
2011
145views more  IJNSEC 2011»
14 years 10 months ago
Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
In this paper, cyclic elliptic curves of the form y2 + xy = x3 + ax2 + b, a, b ∈ GF(2m ) with order M is considered in the design of a Symmetric Key Image Encryption Scheme with...
S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari...
TEDU
2011
243views Education» more  TEDU 2011»
14 years 10 months ago
Sketch Based 3D Character Deformation
Most 3D character editing tools are complex and non-intuitive. It takes lot of skill and labor from the artists to create even a draft 3D humanoid model. This paper proposes an int...
Mo Li, Golam Ashraf
JAMIA
2011
140views more  JAMIA 2011»
14 years 6 months ago
Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule
Objective Healthcare organizations must de-identify patient records before sharing data. Many organizations rely on the Safe Harbor Standard of the HIPAAPrivacy Rule, which enumer...
Bradley Malin, Kathleen Benitez, Daniel R. Masys
JAMIA
2011
83views more  JAMIA 2011»
14 years 6 months ago
Use of electronic clinical documentation: time spent and team interactions
Objective To measure the time spent authoring and viewing documentation and to study patterns of usage in healthcare practice. Design Audit logs for an electronic health record we...
George Hripcsak, David K. Vawdrey, Matthew R. Fred...
ICDE
2012
IEEE
291views Database» more  ICDE 2012»
14 years 3 months ago
Efficiently Monitoring Top-k Pairs over Sliding Windows
Top-k pairs queries have received significant attention by the research community. k-closest pairs queries, k-furthest pairs queries and their variants are among the most well stu...
Zhitao Shen, Muhammad Aamir Cheema, Xuemin Lin, We...
« Prev « First page 2586 / 2816 Last » Next »