Sciweavers

145 search results - page 22 / 29
» External Uniqueness Is Unique Enough
Sort
View
HIKM
2006
ACM
14 years 1 months ago
A flexible approach for electronic medical records exchange
Many methodologies have been proposed in the last decade for integration and exchange of medical data. However, little progress has occurred due to the following reasons. First, p...
Vagelis Hristidis, Peter J. Clarke, Nagarajan Prab...
BIOADIT
2004
Springer
14 years 24 days ago
The Genealogy of Biomimetics: Half a Century?s Quest for Dynamic IT
Abstract. Biologically inspired approaches to the design of general IT are presently flourishing. Investigating the scientific and historical roots of the tendency will serve to pr...
Mikkel Holm Sørensen
ITCC
2003
IEEE
14 years 20 days ago
A Learning Objects Approach to Teaching Programming
The goal of this paper is to describe a new approach to a content creation and delivery mechanism for a programming course. This approach is based on the concept of creating a lar...
Victor Adamchik, Ananda Gunawardena
IWVF
2001
Springer
13 years 12 months ago
Volume and Surface Area Distributions of Cracks in Concrete
Volumetric images of small mortar samples under load are acquired by X-ray microtomography. The images are binarized at many different threshold values, and over a million connecte...
George Nagy, Tong Zhang, W. R. Franklin, Eric Land...
CCS
2007
ACM
13 years 11 months ago
Covert channels in privacy-preserving identification systems
We examine covert channels in privacy-enhanced mobile identification devices where the devices uniquely identify themselves to an authorized verifier. Such devices (e.g. RFID tags)...
Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels