Sciweavers

1398 search results - page 151 / 280
» Medical Database Security
Sort
View
155
Voted
FPGA
2008
ACM
623views FPGA» more  FPGA 2008»
15 years 5 months ago
From the bitstream to the netlist
We present an in-depth analysis of the Xilinx bitstream format. The information gathered in this paper allows bitstream compilation and decompilation. While not actually compromis...
Jean-Baptiste Note, Éric Rannaud
BMCBI
2008
151views more  BMCBI 2008»
15 years 4 months ago
An integrated database-pipeline system for studying single nucleotide polymorphisms and diseases
Background: Studies on the relationship between disease and genetic variations such as single nucleotide polymorphisms (SNPs) are important. Genetic variations can cause disease b...
Jin Ok Yang, Sohyun Hwang, Jeongsu Oh, Jong Bhak, ...
139
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
A Critique of k-Anonymity and Some of Its Enhancements
k-Anonymity is a privacy property requiring that all combinations of key attributes in a database be repeated at least for k records. It has been shown that k-anonymity alone does...
Josep Domingo-Ferrer, Vicenç Torra
127
Voted
JNW
2008
103views more  JNW 2008»
15 years 4 months ago
Key Revocation System for DNSSEC
Abstract-- The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions...
Gilles Guette
OOPSLA
2010
Springer
15 years 2 months ago
Modular logic metaprogramming
In logic metaprogramming, programs are not stored as plain textfiles but rather derived from a deductive database. While the benefits of this approach for metaprogramming are ob...
Karl Klose, Klaus Ostermann