Sciweavers

1401 search results - page 243 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
14 years 2 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu
MOBISYS
2008
ACM
14 years 8 months ago
Virtual trip lines for distributed privacy-preserving traffic monitoring
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, ...
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, ...
ISI
2004
Springer
14 years 2 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
ISW
2009
Springer
14 years 3 months ago
Adding Trust to P2P Distribution of Paid Content
While peer-to-peer (P2P) file-sharing is a powerful and cost-effective content distribution model, most paid-for digital-content providers (CPs) use direct download to deliver th...
Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos...
TWC
2008
111views more  TWC 2008»
13 years 8 months ago
A Game-Theoretic Approach for Exploiting Multiuser Diversity in Cooperative Slotted Aloha
Abstract-- Multiuser diversity gains can be achieved by assigning channels to users with better channel quality in multiuser systems. To avoid the extensive information exchange re...
Dandan Wang, Cristina Comaniciu, Hlaing Minn, Naof...