Sciweavers

1587 search results - page 300 / 318
» Software Engineering Programmes are not Computer Science Pro...
Sort
View
CCS
2007
ACM
15 years 7 months ago
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
107
Voted
KDD
2009
ACM
296views Data Mining» more  KDD 2009»
16 years 1 months ago
Anonymizing healthcare data: a case study on the blood transfusion service
: Gaining access to high-quality health data is a vital requirement to informed decision making for medical practitioners and pharmaceutical researchers. Driven by mutual benefits ...
Noman Mohammed, Benjamin C. M. Fung, Patrick C. K....
136
Voted
DAGSTUHL
2011
14 years 16 days ago
Feature Extraction for DW-MRI Visualization: The State of the Art and Beyond
By measuring the anisotropic self-diffusion rates of water, Diffusion Weighted Magnetic Resonance Imaging (DW-MRI) provides a unique noninvasive probe of fibrous tissue. In par...
Thomas Schultz
101
Voted
JCIT
2010
127views more  JCIT 2010»
14 years 7 months ago
Review of PSE (Problem Solving Environment) Study
This review paper presents an overview of the current state of the art in Problem Solving Environments (PSE). PSE provides integrated human-friendly innovative computational servi...
Shigeo Kawata
113
Voted
EUROSYS
2009
ACM
15 years 4 months ago
Effective and efficient compromise recovery for weakly consistent replication
Weakly consistent replication of data has become increasingly important both for loosely-coupled collections of personal devices and for large-scale infrastructure services. Unfor...
Prince Mahajan, Ramakrishna Kotla, Catherine C. Ma...