Sciweavers

1398 search results - page 183 / 280
» Medical Database Security
Sort
View
143
Voted
PODS
2011
ACM
163views Database» more  PODS 2011»
14 years 6 months ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...
157
Voted
SIGMOD
2011
ACM
179views Database» more  SIGMOD 2011»
14 years 6 months ago
No free lunch in data privacy
Differential privacy is a powerful tool for providing privacypreserving noisy query answers over statistical databases. It guarantees that the distribution of noisy query answers...
Daniel Kifer, Ashwin Machanavajjhala
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 10 months ago
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
Compliance storage is an increasingly important area for businesses faced with a myriad of new document retention regulations. Today, businesses have turned to Write-One Read Many ...
Nikita Borisov, Soumyadeb Mitra
MICCAI
2009
Springer
16 years 5 months ago
Non-rigid Image Registration with Uniform Gradient Spherical Patterns
Abstract. In this paper, we propose a new feature based non-rigid image registration method for dealing with two important issues. First, in order to establish reliable anatomical ...
Shu Liao, Albert C. S. Chung
133
Voted
KDD
2009
ACM
159views Data Mining» more  KDD 2009»
16 years 4 months ago
Mining brain region connectivity for alzheimer's disease study via sparse inverse covariance estimation
Effective diagnosis of Alzheimer's disease (AD), the most common type of dementia in elderly patients, is of primary importance in biomedical research. Recent studies have de...
Liang Sun, Rinkal Patel, Jun Liu, Kewei Chen, Tere...