Sciweavers

536 search results - page 100 / 108
» Embedding Information Security into the Organization
Sort
View
BMCBI
2006
104views more  BMCBI 2006»
13 years 8 months ago
MANET: tracing evolution of protein architecture in metabolic networks
Background: Cellular metabolism can be characterized by networks of enzymatic reactions and transport processes capable of supporting cellular life. Our aim is to find evolutionar...
Hee Shin Kim, Jay E. Mittenthal, Gustavo Caetano-A...
IJPRAI
2000
62views more  IJPRAI 2000»
13 years 7 months ago
Knowledge-Guided Classification of Coastal Zone Color Images Off the West Florida Shelf
Abstract A knowledge-guided approach to automatic classification of Coastal Zone Color images of the West Florida Shelf is described. The approach is used to identify red tides on ...
Mingrui Zhang, Lawrence O. Hall, Dmitry B. Goldgof...
WPES
2004
ACM
14 years 1 months ago
Private collaborative forecasting and benchmarking
Suppose a number of hospitals in a geographic area want to learn how their own heart-surgery unit is doing compared with the others in terms of mortality rates, subsequent complic...
Mikhail J. Atallah, Marina Bykova, Jiangtao Li, Ke...
MOBILITY
2009
ACM
14 years 2 months ago
UbiPay: minimizing transaction costs with smart mobile payments
Implementing an electronic payment system involves striking a balance between usability and security. Systems that allow payments to be completed with little effort on the part of...
Vili Lehdonvirta, Hayuru Soma, Hitoshi Ito, Tetsuo...
SOUPS
2009
ACM
14 years 2 months ago
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Feedback is viewed as an essential element of ubiquitous computing systems in the HCI literature for helping people manage their privacy. However, the success of online social net...
Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes D...