Sciweavers

1401 search results - page 164 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
SACMAT
2010
ACM
13 years 7 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
PERCOM
2003
ACM
14 years 8 months ago
Mobile Link Services with MQSeries Everyplace
The Open Hypermedia model is based upon the separation of hypertext links from documents and treats them as separate entities. Distributed link services take this approach and imp...
Sanjay Vivek, Kenneth Tso, David De Roure
SOUPS
2009
ACM
14 years 3 months ago
Revealing hidden context: improving mental models of personal firewall users
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. However, concealing the impact of network context on th...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov
MIE
2008
177views Healthcare» more  MIE 2008»
13 years 10 months ago
Process Mining Techniques: an Application to Stroke Care
In a competitive health-care market, hospitals have to focus on ways to streamline their processes in order to deliver high quality care while at the same time reducing costs. To a...
Ronny Mans, Helen Schonenberg, Giorgio Leonardi, S...
NAR
1998
112views more  NAR 1998»
13 years 8 months ago
MITOMAP: a human mitochondrial genome database--1998 update
We have continued to develop MITOMAP (http://www.gen.emory.edu/MITOMAP ), a comprehensive database for the human mitochondrial DNA (mtDNA). MITOMAP uses the mtDNA sequence as the ...
Andreas M. Kogelnik, Marie T. Lott, Michael D. Bro...