Sciweavers

826 search results - page 55 / 166
» Medical Requirements for Data Protection
Sort
View
96
Voted
ESTIMEDIA
2004
Springer
15 years 6 months ago
Data assignment and access scheduling exploration for multi-layer memory architectures
Abstract— This paper presents an exploration framework which performs data assignment and access scheduling exploration for applications given a multilayer memory architecture. O...
Radoslaw Szymanek, Francky Catthoor, Krzysztof Kuc...
113
Voted
CG
2002
Springer
15 years 19 days ago
Shape reconstruction from partially missing data in modal space
To reconstruct the shape of objects from incomplete point sets or noisy images, robust and accurate reconstruction methods are required. This paper presents a physics-based approa...
Soo-Mi Choi, Myoung-Hee Kim
GIS
2008
ACM
16 years 1 months ago
Privacy: preserving trajectory collection
In order to provide context?aware Location?Based Services, real location data of mobile users must be collected and analyzed by spatio?temporal data mining methods. However, the d...
Gyözö Gidófalvi, Torben Bach Pede...
123
Voted
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
15 years 5 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...
107
Voted
IEEEARES
2008
IEEE
15 years 7 months ago
A Security Model and its Application to a Distributed Decision Support System for Healthcare
A distributed decision support system involving multiple clinical centres is crucial to the diagnosis of rare diseases. Although sharing of valid diagnosed cases can facilitate la...
Liang Xiao 0002, Javier Vicente, Carlos Sáe...