Sciweavers

4445 search results - page 794 / 889
» Reflective Authorization Systems
Sort
View
ISN
1998
Springer
15 years 1 months ago
See What You Sign: Secure Implementations of Digital Signatures
An expectation of a signature system is that a signatory cannot dispute a signature. Aiming at this, the following questions arise: Can documents in electronic commerce on the Inte...
Arnd Weber
ICCD
1995
IEEE
109views Hardware» more  ICCD 1995»
15 years 1 months ago
Verifying the performance of the PCI local bus using symbolic techniques
Symbolic model checking is a successful technique for checking properties of large finite-state systems. This method has been used to verify a number of real-world hardware desig...
Sérgio Vale Aguiar Campos, Edmund M. Clarke...
ICDCS
1995
IEEE
15 years 1 months ago
Specifying Weak Sets
nt formal speci cations of a new abstraction, weak sets, which can be used to alleviate high latencies when retrieving data from a wide-area information system like the World Wide...
Jeannette M. Wing, David C. Steere
CHI
2009
ACM
15 years 1 months ago
I just don't know why it's gone: maintaining informal information use in inpatient care
We conducted a field-based study examining informal nursing information. We examined the use of this information before and after the adoption of a CPOE (Computerized Provider Ord...
Xiaomu Zhou, Mark S. Ackerman, Kai Zheng
HUC
2009
Springer
15 years 1 months ago
Validated caloric expenditure estimation using a single body-worn sensor
In 2007, approximately 30% of US adults were obese, with related health care costs exceeding 100 billion dollars. Clearly, the obesity epidemic represents a growing societal conce...
Jonathan Lester, Carl Hartung, Laura Pina, Ryan Li...