Sciweavers

1155 search results - page 63 / 231
» Trusting Data Quality in Cooperative Information Systems
Sort
View
JSAC
2007
101views more  JSAC 2007»
15 years 1 months ago
CoopMAC: A Cooperative MAC for Wireless LANs
— Due to the broadcast nature of wireless signals, a wireless transmission intended for a particular destination station can be overheard by other neighboring stations. A focus o...
Pei Liu, Zhifeng Tao, Sathya Narayanan, Thanasis K...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 8 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
CARS
2001
15 years 3 months ago
Rendering and interaction in co-operative 3-D image analysis
Most interactive segmentation methods are defined at a 2-d level requiring sometimes extensive interaction when the object of interest is difficult to be outlined by simple means ...
Klaus D. Tönnies, Manfred Hinz, Regina Pohle
CHI
2009
ACM
15 years 5 months ago
I just don't know why it's gone: maintaining informal information use in inpatient care
We conducted a field-based study examining informal nursing information. We examined the use of this information before and after the adoption of a CPOE (Computerized Provider Ord...
Xiaomu Zhou, Mark S. Ackerman, Kai Zheng
MOBIHOC
2008
ACM
16 years 1 months ago
Analyzing DISH for multi-channel MAC protocols in wireless networks
For long, node cooperation has been exploited as a data relaying mechanism. However, the wireless channel allows for much richer interaction between nodes. One such scenario is in...
Tie Luo, Mehul Motani, Vikram Srinivasan