Sciweavers

3349 search results - page 538 / 670
» Data Security
Sort
View
158
Voted
ICASSP
2011
IEEE
14 years 6 months ago
Human gait parameter estimation based on micro-doppler signatures using particle filters
Monitoring and tracking human activities around restricted areas is an important issue in security and surveillance applications. The movement of different parts of the human body...
M. B. Guldogan, Fredrik Gustafsson, Umut Orguner, ...
AMW
2011
14 years 6 months ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis
130
Voted
SIGCOMM
2012
ACM
13 years 5 months ago
Bulk of interest: performance measurement of content-centric routing
The paradigm of information-centric networking subsumes recent approaches to integrate content replication services into a future Internet layer. Current concepts foster either a ...
Matthias Wählisch, Thomas C. Schmidt, Markus ...
JAMIA
2011
101views more  JAMIA 2011»
14 years 5 months ago
The military health system's personal health record pilot with Microsoft HealthVault and Google Health
Objective To design, build, implement, and evaluate a personal health record (PHR), tethered to the Military Health System, that leverages MicrosoftÒ HealthVault and GoogleÒ Hea...
Nhan V. Do, Rick Barnhill, Kimberly A. Heermann-Do...
97
Voted
DEBU
2000
90views more  DEBU 2000»
15 years 2 months ago
Personal Views for Web Catalogs
Large growth in e-commerce has culiminated in technology boom to enable companies to better serve their consumers. The front-end of the e-commerce business is to better reach the ...
Kajal T. Claypool, Li Chen, Elke A. Rundensteiner