Sciweavers

826 search results - page 75 / 166
» Medical Requirements for Data Protection
Sort
View
93
Voted
INFOCOM
2008
IEEE
15 years 7 months ago
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yuguang Fang
93
Voted
MICCAI
2006
Springer
16 years 1 months ago
Markerless Endoscopic Registration and Referencing
Abstract. Accurate patient registration and referencing is a key element in navigated surgery. Unfortunately all existing methods are either invasive or very time consuming. In thi...
Christian Wengert, Philippe C. Cattin, John M. Duf...
95
Voted
ISBI
2002
IEEE
16 years 1 months ago
A new convergent MAP reconstruction algorithm for emission tomography using ordered subsets and separable surrogates
We investigate a new, fast and provably convergentMAP reconstruction algorithm for emission tomography. The new algorithm, termed C-OSEM has its origin in the alternating algorith...
Ing-Tsung Hsiao, Anand Rangarajan, Gene Gindi
124
Voted
ISBI
2009
IEEE
15 years 7 months ago
Quantitative Comparison of Spot Detection Methods in Live-Cell Fluorescence Microscopy Imaging
In live-cell fluorescence microscopy imaging, quantitative analysis of biological image data generally involves the detection of many subresolution objects, appearing as diffract...
Ihor Smal, Marco Loog, Wiro J. Niessen, Erik H. W....
CBMS
2008
IEEE
15 years 7 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...