Sciweavers

3555 search results - page 592 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
JAMIA
2011
68views more  JAMIA 2011»
14 years 4 months ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
CCR
1999
92views more  CCR 1999»
15 years 1 months ago
YESSIR: a simple reservation mechanism for the Internet
Abstract-RSVP has been designed to support resource reservation in the Internet. However, it has two major problems: complexity and scalability. The former results in large message...
Ping Pan, Henning Schulzrinne
TPDS
2010
154views more  TPDS 2010»
14 years 8 months ago
Adaptive Workload Prediction of Grid Performance in Confidence Windows
Predicting grid performance is a complex task because heterogeneous resource nodes are involved in a distributed environment. Long execution workload on a grid is even harder to pr...
Yongwei Wu, Kai Hwang, Yulai Yuan, Weimin Zheng
CHI
2004
ACM
16 years 1 months ago
IM here: public instant messaging on large, shared displays for workgroup interactions
Instant messaging (IM) in the workplace has proven to be a valuable tool for facilitating informal communication. Its benefits, however, are generally limited to times when users ...
Elaine M. Huang, Daniel M. Russell, Alison E. Sue
MIG
2009
Springer
15 years 8 months ago
A Semantic Navigation Model for Video Games
Abstract. Navigational performance of artificial intelligence (AI) characters in computer games is gaining an increasingly important role in the perception of their behavior. Whil...
Leonard van Driel, Rafael Bidarra