Sciweavers

366 search results - page 58 / 74
» Communications in Electronic Textile Systems
Sort
View
SIGECOM
2004
ACM
77views ECommerce» more  SIGECOM 2004»
14 years 3 months ago
Stopping outgoing spam
We analyze the problem of preventing outgoing spam. We show that some conventional techniques for limiting outgoing spam are likely to be ineffective. We show that while imposing...
Joshua T. Goodman, Robert Rounthwaite
MIE
2008
177views Healthcare» more  MIE 2008»
13 years 11 months ago
Process Mining Techniques: an Application to Stroke Care
In a competitive health-care market, hospitals have to focus on ways to streamline their processes in order to deliver high quality care while at the same time reducing costs. To a...
Ronny Mans, Helen Schonenberg, Giorgio Leonardi, S...
VTC
2010
IEEE
147views Communications» more  VTC 2010»
13 years 8 months ago
Performance Evaluation of Mobile Multicast Session Initialization Techniques for Remote Software Upload in Vehicle ECUs
— Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update functionality of an existing ...
Irina Hossain, Syed Masud Mahmud, Moon Ho Hwang
AIME
2005
Springer
14 years 3 months ago
Multi-agent Patient Representation in Primary Care
Though multi-agent systems have been explored in a wide variety of medical settings, their role at the primary care level has been relatively little investigated. In this paper, we...
Chris Reed, Brian Boswell, Ron Neville
FC
2010
Springer
171views Cryptology» more  FC 2010»
14 years 1 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore