Sciweavers

4075 search results - page 809 / 815
» Modeling Distributed Algorithm Using B
Sort
View
103
Voted
INFOCOM
2000
IEEE
15 years 2 months ago
Egress Admission Control
—Allocating resources for multimedia traffic flows with real-time performance requirements is an important challenge for future packet networks. However, in large-scale networks,...
Coskun Cetinkaya, Edward W. Knightly
CSFW
2004
IEEE
15 years 2 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell
94
Voted
CDC
2009
IEEE
208views Control Systems» more  CDC 2009»
14 years 11 months ago
Sensor selection for hypothesis testing in wireless sensor networks: a Kullback-Leibler based approach
We consider the problem of selecting a subset of p out of n sensors for the purpose of event detection, in a wireless sensor network (WSN). Occurrence or not of the event of intere...
Dragana Bajovic, Bruno Sinopoli, João Xavie...
BMCBI
2004
265views more  BMCBI 2004»
14 years 10 months ago
ASAView: Database and tool for solvent accessibility representation in proteins
Background: Accessible surface area (ASA) or solvent accessibility of amino acids in a protein has important implications. Knowledge of surface residues helps in locating potentia...
Shandar Ahmad, M. Michael Gromiha, Hamed Fawareh, ...
127
Voted
IHI
2010
197views Healthcare» more  IHI 2010»
14 years 5 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...