Sciweavers

2441 search results - page 437 / 489
» Integrated Medical Analysis System
Sort
View
CCS
2009
ACM
15 years 4 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Jessica Staddon
AIME
2009
Springer
15 years 4 months ago
Mining Healthcare Data with Temporal Association Rules: Improvements and Assessment for a Practical Use
Abstract. The Regional Healthcare Agency (ASL) of Pavia has been maintaining a central data repository which stores healthcare data about the population of Pavia area. The analysis...
Stefano Concaro, Lucia Sacchi, Carlo Cerra, Pietro...
EDOC
2007
IEEE
15 years 4 months ago
Providing Support for Model Composition in Metamodels
In aspect-oriented modeling (AOM), a design is described using a set of design views. It is sometimes necessary to compose the views to obtain an integrated view that can be analy...
Robert B. France, Franck Fleurey, Raghu Reddy, Ben...
SRDS
2007
IEEE
15 years 4 months ago
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. ...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
ESORICS
2007
Springer
15 years 3 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...