Sciweavers

754 search results - page 134 / 151
» Can self-managed systems be trusted
Sort
View
DRR
2009
13 years 5 months ago
Using synthetic data safely in classification
When is it safe to use synthetic data in supervised classification? Trainable classifier technologies require large representative training sets consisting of samples labeled with...
Jean Nonnemaker, Henry Baird
ICTAI
2009
IEEE
13 years 5 months ago
A Knowledge-Light Nonlinear Case-Based Reasoning Approach to Radiotherapy Planning
Radiation is often used in prostate cancer treatments. Radiotherapy treatment planning is a complex decision making process. In order to make a patient well, the oncologist has to...
Nishikant Mishra, Sanja Petrovic, Santhanam Sundar
MOBISYS
2011
ACM
12 years 10 months ago
ProxiMate: proximity-based secure pairing using ambient wireless signals
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wire...
Suhas Mathur, Robert C. Miller, Alexander Varshavs...
IJCMAM
2010
160views more  IJCMAM 2010»
13 years 5 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...
ICSE
2000
IEEE-ACM
13 years 11 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine