Sciweavers

2286 search results - page 360 / 458
» Technologies for Integrating Biological Data
Sort
View
WISTP
2010
Springer
14 years 9 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
GCA
2009
14 years 9 months ago
Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation
This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged int...
Po-Wah Yau, Allan Tomlinson
ISBI
2011
IEEE
14 years 3 months ago
A hybrid method for 2-D/3-D registration between 3-D volumes and 2-D angiography for trans-catheter aortic valve implantation (T
Minimally invasive trans-catheter aortic valve implantation (TAVI) procedure can be greatly facilitated using smart visualization and guidance technology involving the 3-D model o...
Shun Miao, Rui Liao, Yefeng Zheng
SIGMOD
2010
ACM
217views Database» more  SIGMOD 2010»
15 years 4 months ago
Mining knowledge from databases: an information network analysis approach
Most people consider a database is merely a data repository that supports data storage and retrieval. Actually, a database contains rich, inter-related, multi-typed data and infor...
Jiawei Han, Yizhou Sun, Xifeng Yan, Philip S. Yu
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
15 years 3 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa