Sciweavers

181 search results - page 35 / 37
» A Practical Approach to Coverage in Model Checking
Sort
View
TCC
2009
Springer
255views Cryptology» more  TCC 2009»
14 years 8 months ago
LEGO for Two-Party Secure Computation
The first and still most popular solution for secure two-party computation relies on Yao's garbled circuits. Unfortunately, Yao's construction provide security only again...
Jesper Buus Nielsen, Claudio Orlandi
OTM
2009
Springer
14 years 2 months ago
Heterogeneity and Context in Semantic-Web-Enabled HCLS Systems
The need for semantics preserving integration of complex data has been widely recognized in the healthcare domain. While standards such as Health Level Seven (HL7) have been develo...
Antoine Zimmermann, Ratnesh Sahay, Ronan Fox, Axel...
CIDR
2007
141views Algorithms» more  CIDR 2007»
13 years 9 months ago
Data-Driven Processing in Sensor Networks
Wireless sensor networks are poised to enable continuous data collection on unprecedented scales, in terms of area location and size, and frequency. This is a great boon to field...
Adam Silberstein, Gregory Filpus, Kamesh Munagala,...
FORMATS
2006
Springer
13 years 11 months ago
Extended Directed Search for Probabilistic Timed Reachability
Current numerical model checkers for stochastic systems can efficiently analyse stochastic models. However, the fact that they are unable to provide debugging information constrain...
Husain Aljazzar, Stefan Leue
WEBNET
1997
13 years 8 months ago
Telemedicine: An Inquiry in the Economic and Social Dynamics of Communications Technologies in the Medical Field
The health care industry in the United States has been experiencing substantial and ever increasing cost pressures. At the same time, many forces are revolutionizing the way healt...
Francis Pereira, Elizabeth Fife, Antonio A. Schuh