Sciweavers

3210 search results - page 126 / 642
» Secure Similarity Search
Sort
View
JCDL
2011
ACM
272views Education» more  JCDL 2011»
14 years 8 months ago
CollabSeer: a search engine for collaboration discovery
Collaborative research has been increasingly popular and important in academic circles. However, there is no open platform available for scholars or scientists to effectively dis...
Hung-Hsuan Chen, Liang Gou, Xiaolong Zhang, Clyde ...
249
Voted
HICSS
2011
IEEE
203views Biometrics» more  HICSS 2011»
14 years 8 months ago
Will HITECH Heal Patient Data Hemorrhages?
Hemorrhages of confidential patient health data create privacy and security concerns. While the US HIPAA legislation on privacy and security went into effect over five years ago, ...
M. Eric Johnson, Nicholas D. Willey
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
15 years 12 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
118
Voted
ISSA
2004
15 years 6 months ago
A Comparative Study Of Standards And Practices Related To Information Security Management
The need for Information Security in organisations, regardless of their type and size, is being addressed by emerging standards and recommended best practices. The various standar...
Evangelos D. Frangopoulos
DELOS
2000
15 years 6 months ago
Analysis of the Effectiveness-Efficiency Dependence for Image Retrieval
Similarity search in image database is commonly implemented as nearest-neighbor search in a feature space of the images. For that purpose, a large number of different features as ...
Martin Heczko, Daniel A. Keim, Roger Weber