Sciweavers

903 search results - page 112 / 181
» Usability inspection methods
Sort
View
86
Voted
EDBT
2010
ACM
237views Database» more  EDBT 2010»
15 years 5 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek
89
Voted
SOUPS
2006
ACM
15 years 4 months ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat
SCIA
2007
Springer
154views Image Analysis» more  SCIA 2007»
15 years 4 months ago
3D Deformable Registration for Monitoring Radiotherapy Treatment in Prostate Cancer
Two deformable registration methods, the Demons and the Morphon algorithms, have been used for registration of CT datasets to evaluate their usability in radiotherapy planning for ...
Borja Rodríguez-Vila, Johanna Pettersson, M...
98
Voted
FASE
2004
Springer
15 years 3 months ago
Checking Absence of Illicit Applet Interactions: A Case Study
Abstract. This paper presents the use of a method – and its corresponding tool set – for compositional verification of applet interactions on a realistic industrial smart card...
Marieke Huisman, Dilian Gurov, Christoph Sprenger,...
89
Voted
MM
2009
ACM
245views Multimedia» more  MM 2009»
15 years 4 months ago
Concept detectors: how good is good enough?
Today, semantic concept based video retrieval systems often show insufficient performance for real-life applications. Clearly, a big share of the reason is the lacking performance...
Robin Aly, Djoerd Hiemstra