Sciweavers

19922 search results - page 3916 / 3985
» Human Computer Interaction
Sort
View
130
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Developing a security protocol for a distributed decision support system in a healthcare environment
In this paper, we describe the unique security issues involved in healthcare domains. These have been addressed to the needs of the HealthAgents project. In the proposed approach,...
Liang Xiao 0002, Paul H. Lewis, Alex Gibb
147
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Impact analysis of database schema changes
We propose static program analysis techniques for identifying the impact of relational database schema changes upon object-oriented applications. We use dataflow analysis to extra...
Andy Maule, Wolfgang Emmerich, David S. Rosenblum
245
Voted
ICDT
2009
ACM
150views Database» more  ICDT 2009»
16 years 3 months ago
Optimizing user views for workflows
A technique called user views has recently been proposed to focus user attention on relevant information in response to provenance queries over workflow executions [1, 2]: Given u...
Olivier Biton, Susan B. Davidson, Sanjeev Khanna, ...
159
Voted
WWW
2008
ACM
16 years 3 months ago
Contextual advertising by combining relevance with click feedback
Contextual advertising supports much of the Web's ecosystem today. User experience and revenue (shared by the site publisher ad the ad network) depend on the relevance of the...
Deepayan Chakrabarti, Deepak Agarwal, Vanja Josifo...
120
Voted
PKC
2009
Springer
166views Cryptology» more  PKC 2009»
16 years 3 months ago
Security of Blind Signatures under Aborts
We explore the security of blind signatures under aborts where the user or the signer may stop the interactive signature issue protocol prematurely. Several works on blind signatur...
Dominique Schröder, Marc Fischlin
« Prev « First page 3916 / 3985 Last » Next »