Sciweavers

826 search results - page 114 / 166
» Medical Requirements for Data Protection
Sort
View
IJMI
2010
149views more  IJMI 2010»
14 years 8 months ago
Analysis of communicative behaviour: Profiling roles and activities
In this paper, we discuss how profiles of communicative behaviour can be used to present and analyse information about role activity recorded through structured observation of spec...
Inger Dybdahl Sørby, Øystein Nytr&os...
VC
2010
143views more  VC 2010»
14 years 4 months ago
A PDE method for patchwise approximation of large polygon meshes
Abstract Three-dimensional (3D) representations of complex geometric shapes, especially when they are reconstructed from magnetic resonance imaging (MRI) and computed tomography (C...
Yun Sheng, Alexei Sourin, Gabriela González...
CHI
2005
ACM
15 years 10 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
ISW
2007
Springer
15 years 3 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...
SACMAT
2010
ACM
15 years 2 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller