Sciweavers

1575 search results - page 40 / 315
» The provenance of electronic data
Sort
View
IJMI
2007
140views more  IJMI 2007»
14 years 9 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
CVRMED
1995
Springer
15 years 1 months ago
Adaptive Segmentation of MRI Data
Abstract. Intensity-based classification of MR images has proven problematic, even when advanced techniques are used. Intra-scan and interscan intensity inhomogeneities are a comm...
William M. Wells III, W. Eric L. Grimson, Ron Kiki...
VIS
2004
IEEE
148views Visualization» more  VIS 2004»
15 years 11 months ago
Detection and Visualization of Anomalous Structures in Molecular Dynamics Simulation Data
In this article we explore techniques to detect and visualize features in data from molecular dynamics (MD) simulations. Although the techniques proposed are general, we focus on ...
John Wilkins, Kaden Hazzard, Raghu Machiraju, Same...
JCIT
2008
74views more  JCIT 2008»
14 years 9 months ago
SHAMAN Research and Implementation of an Electronic Medical Records System
In the recent decades the importance of the information systems (IS) has been steadily growing. Nowadays most of the operations that imply complex manipulations with data and stor...
Yerbol Nisanbayev, Il Seok Ko, Olga Yugay
EUROCRYPT
2001
Springer
15 years 2 months ago
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
Abstract. Known practical blind signature schemes whose security against adaptive and parallel attacks can be proven in the random oracle model either need five data exchanges bet...
Masayuki Abe