Sciweavers

291 search results - page 31 / 59
» Enforceable social laws
Sort
View
HOST
2009
IEEE
15 years 4 months ago
Detecting Trojan Circuit Attacks
Abstract—Rapid advances in integrated circuit (IC) development predicted by Moore’s Law lead to increasingly complex, hard to verify IC designs. Design insiders or adversaries ...
Gedare Bloom, Bhagirath Narahari, Rahul Simha
ACMICEC
2006
ACM
215views ECommerce» more  ACMICEC 2006»
15 years 3 months ago
Economics of online music and consumer behavior
In this paper we first provide a literature review about the economics of online music. Second, we then present an economical model for online music by incorporating various param...
Marc Fetscherin
PG
2003
IEEE
15 years 2 months ago
Physical Touch-Up of Human Motions
Many popular motion editing methods do not take physical principles into account potentially producing implausible motions. This paper introduces an efficient method for touching...
Hyun Joon Shin, Lucas Kovar, Michael Gleicher
IJMI
2007
140views more  IJMI 2007»
14 years 9 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
106
Voted
KDD
2004
ACM
137views Data Mining» more  KDD 2004»
15 years 2 months ago
Mining scale-free networks using geodesic clustering
Many real-world graphs have been shown to be scale-free— vertex degrees follow power law distributions, vertices tend to cluster, and the average length of all shortest paths is...
Andrew Y. Wu, Michael Garland, Jiawei Han