Sciweavers

826 search results - page 101 / 166
» Medical Requirements for Data Protection
Sort
View
GCA
2009
14 years 7 months ago
Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation
This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged int...
Po-Wah Yau, Allan Tomlinson
ICC
2007
IEEE
107views Communications» more  ICC 2007»
15 years 4 months ago
OFDM PAPR Reduction Using Selected Mapping Without Side Information
— Selected mapping (SLM) is a well-known method for reducing the peak-to-average power ratio (PAPR) in orthogonal frequency-division multiplexing (OFDM) systems. The main drawbac...
Boon Kien Khoo, Stéphane Y. Le Goff, Charal...
IRI
2006
IEEE
15 years 4 months ago
An RDF-based annotation framework for providing web resources integrity
: Data integrity of web resources is becoming more and more important with the increasing development of Internet. In the context of active intermediaries, current solution for dat...
Dejun Jiang, Chi-Hung Chi, Lin Liu
CIKM
2005
Springer
15 years 3 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...
CHI
2009
ACM
15 years 1 months ago
I just don't know why it's gone: maintaining informal information use in inpatient care
We conducted a field-based study examining informal nursing information. We examined the use of this information before and after the adoption of a CPOE (Computerized Provider Ord...
Xiaomu Zhou, Mark S. Ackerman, Kai Zheng