Sciweavers

826 search results - page 55 / 166
» Medical Requirements for Data Protection
Sort
View
ESTIMEDIA
2004
Springer
15 years 3 months ago
Data assignment and access scheduling exploration for multi-layer memory architectures
Abstract— This paper presents an exploration framework which performs data assignment and access scheduling exploration for applications given a multilayer memory architecture. O...
Radoslaw Szymanek, Francky Catthoor, Krzysztof Kuc...
CG
2002
Springer
14 years 9 months ago
Shape reconstruction from partially missing data in modal space
To reconstruct the shape of objects from incomplete point sets or noisy images, robust and accurate reconstruction methods are required. This paper presents a physics-based approa...
Soo-Mi Choi, Myoung-Hee Kim
GIS
2008
ACM
15 years 10 months ago
Privacy: preserving trajectory collection
In order to provide context?aware Location?Based Services, real location data of mobile users must be collected and analyzed by spatio?temporal data mining methods. However, the d...
Gyözö Gidófalvi, Torben Bach Pede...
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
15 years 1 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
IEEEARES
2008
IEEE
15 years 4 months ago
A Security Model and its Application to a Distributed Decision Support System for Healthcare
A distributed decision support system involving multiple clinical centres is crucial to the diagnosis of rare diseases. Although sharing of valid diagnosed cases can facilitate la...
Liang Xiao 0002, Javier Vicente, Carlos Sáe...