Sciweavers

1398 search results - page 73 / 280
» Medical Database Security
Sort
View
85
Voted
MICCAI
2006
Springer
16 years 1 months ago
A Comparison of Breast Tissue Classification Techniques
It is widely accepted in the medical community that breast tissue density is an important risk factor for the development of breast cancer. Thus, the development of reliable automa...
Arnau Oliver, Jordi Freixenet, Robert Marti, Reyer...
ISBI
2007
IEEE
15 years 6 months ago
Segmentation of Non-convex Regions within Uterine Cervix Images
The National Cancer Institute has collected a large database of uterine cervix images, termed “cervigrams” for cervical cancer screening research. Tissues of interest within t...
Shiri Gordon, Hayit Greenspan
189
Voted
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
16 years 1 months ago
Sovereign Joins
We present a secure network service for sovereign information sharing whose only trusted component is an off-theshelf secure coprocessor. The participating data providers send enc...
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu,...
82
Voted
IJNSEC
2008
81views more  IJNSEC 2008»
15 years 17 days ago
A Self-Concealing Mechanism for Authentication of Portable Communication Systems
The challenge-response technique is widely adapted for authentication of portable communication systems. For authentication the user can prove his/her identity via a secret shared...
Wei-Bin Lee, Chang-Kuo Yeh
95
Voted
WSC
2007
15 years 2 months ago
Defense and homeland security applications of multi-agent simulations
Department of Defense and Homeland Security analysts are increasingly using multi-agent simulation (MAS) to examine national security issues. This paper summarizes three MAS natio...
Thomas W. Lucas, Susan M. Sanchez, Felix Martinez,...