Sciweavers

161 search results - page 21 / 33
» A system for processing handwritten bank checks automaticall...
Sort
View
ENTCS
2007
88views more  ENTCS 2007»
13 years 7 months ago
Keeping Secrets in Resource Aware Components
We present a powerful and flexible method for automatically checking the secrecy of values inside components. In our framework an attacker may monitor the external communication ...
Tom Chothia, Jun Pang, Muhammad Torabi Dashti
HICSS
2010
IEEE
237views Biometrics» more  HICSS 2010»
14 years 1 months ago
SafeFox: A Safe Lightweight Virtual Browsing Environment
1 The browser has become a popular attack vector for implanting code on computer operating systems. Equally critical, important sessions, such as online banking, must be protected ...
Jiang Wang, Yih Huang, Anup K. Ghosh
DMIN
2006
106views Data Mining» more  DMIN 2006»
13 years 9 months ago
A Medical Claim Fraud/Abuse Detection System based on Data Mining: A Case Study in Chile
This paper describes an effective medical claim fraud/abuse detection system based on data mining used by a Chilean private health insurance company. Fraud and abuse in medical cla...
Pedro A. Ortega, Cristián J. Figueroa, Gonz...
FDL
2005
IEEE
14 years 1 months ago
Meta Modelling of Embedded Systems using Active Databases
The development process of embedded systems is characterized by the cooperation of various domains: components of hardware and software have to be considered as well as components...
Dieter Monjau, Mathias Sporer
AOSD
2009
ACM
13 years 10 months ago
Modular verification of dynamically adaptive systems
Cyber-physical systems increasingly rely on dynamically adaptive programs to respond to changes in their physical environment; examples include ecosystem monitoring and disaster r...
Ji Zhang, Heather Goldsby, Betty H. C. Cheng