Sciweavers

1401 search results - page 229 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
CIARP
2003
Springer
14 years 1 months ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...
IEEEARES
2008
IEEE
14 years 3 months ago
Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations
—Enterprise computing is moving towards more open, collaborative systems. Joining a business network must be made efficient, despite the technical and semantic interoperability ...
Sini Ruohomaa, Lea Kutvonen
CIKM
2005
Springer
14 years 2 months ago
A function-based access control model for XML databases
XML documents are frequently used in applications such as business transactions and medical records involving sensitive information. Typically, parts of documents should be visibl...
Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid...
BMCBI
2006
154views more  BMCBI 2006»
13 years 8 months ago
Automated recognition of malignancy mentions in biomedical literature
Background: The rapid proliferation of biomedical text makes it increasingly difficult for researchers to identify, synthesize, and utilize developed knowledge in their fields of ...
Yang Jin, Ryan T. McDonald, Kevin Lerman, Mark A. ...
EMSOFT
2005
Springer
14 years 2 months ago
QoS control for optimality and safety
We propose a method for fine grain QoS control of real-time applications. The method allows adapting the overall system behavior by adequately setting the quality level parameter...
Jacques Combaz, Jean-Claude Fernandez, Thierry Lep...