Sciweavers

5722 search results - page 207 / 1145
» Security Function Interactions
Sort
View
117
Voted
JSW
2008
122views more  JSW 2008»
15 years 23 days ago
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols
Abstract-- In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M2 AP [14] and EMAP [15], which ...
Tieyan Li, Guilin Wang, Robert H. Deng
110
Voted
PETRA
2010
ACM
14 years 10 months ago
The security and privacy implications of using social networks to deliver healthcare
Healthcare technologies have tended to focus on electronic health records and devices (e.g., devices within the home for patients or handheld devices for nurses and physicians), a...
Carrie Gates, Matt Bishop
BMCBI
2008
130views more  BMCBI 2008»
15 years 28 days ago
Structural descriptor database: a new tool for sequence-based functional site prediction
Background: The Structural Descriptor Database (SDDB) is a web-based tool that predicts the function of proteins and functional site positions based on the structural properties o...
Juliana S. Bernardes, Jorge H. Fernandez, Ana Tere...
128
Voted
KDD
2004
ACM
135views Data Mining» more  KDD 2004»
16 years 1 months ago
Discovering additive structure in black box functions
Many automated learning procedures lack interpretability, operating effectively as a black box: providing a prediction tool but no explanation of the underlying dynamics that driv...
Giles Hooker
114
Voted
VISUALIZATION
2005
IEEE
15 years 6 months ago
Dataset Traversal with Motion-Controlled Transfer Functions
In this paper, we describe a methodology and implementation for interactive dataset traversal using motion-controlled transfer functions. Dataset traversal here refers to the proc...
Carlos D. Correa, Deborah Silver