Sciweavers

4529 search results - page 801 / 906
» Position Based Cryptography
Sort
View
WPES
2004
ACM
15 years 8 months ago
Private collaborative forecasting and benchmarking
Suppose a number of hospitals in a geographic area want to learn how their own heart-surgery unit is doing compared with the others in terms of mortality rates, subsequent complic...
Mikhail J. Atallah, Marina Bykova, Jiangtao Li, Ke...
ESORICS
2004
Springer
15 years 8 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
ICRA
2003
IEEE
148views Robotics» more  ICRA 2003»
15 years 8 months ago
Needle insertion and radioactive seed implantation in human tissues: simulation and sensitivity analysis
− To facilitate training and planning for medical procedures such as prostate brachytherapy, we are developing an interactive simulation of needle insertion and radioactive seed ...
Ron Alterovitz, Kenneth Y. Goldberg, Jean Pouliot,...
ICRA
2003
IEEE
163views Robotics» more  ICRA 2003»
15 years 8 months ago
An experimental study of hybrid switched system approaches to visual servoing
Abstract— In the recent past, many researchers have developed control algorithms for visual servo applications. In this paper, we introduce a new hybrid switched system approach,...
Nicholas R. Gans, Seth Hutchinson
SSDBM
2003
IEEE
164views Database» more  SSDBM 2003»
15 years 8 months ago
Approximate String Joins
String data is ubiquitous, and its management has taken on particular importance in the past few years. Approximate queries are very important on string data especially for more c...
Divesh Srivastava