Sciweavers

739 search results - page 113 / 148
» Information Flow in Credential Systems
Sort
View
CAISE
2010
Springer
13 years 8 months ago
Beyond Process Mining: From the Past to Present and Future
Abstract. Traditionally, process mining has been used to extract models from event logs and to check or extend existing models. This has shown to be useful for improving processes ...
Wil M. P. van der Aalst, Maja Pesic, Minseok Song
CHI
2010
ACM
13 years 11 months ago
Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices
Implantable medical devices (IMDs) improve patients' quality of life and help sustain their lives. In this study, we explore patient views and values regarding their devices ...
Tamara Denning, Alan Borning, Batya Friedman, Bria...
DSS
2007
79views more  DSS 2007»
13 years 7 months ago
Leveraging Question Answer technology to address terrorism inquiry
This paper investigates the potential use of dialog-based ALICEbots in disseminating terrorism information to the general public. In particular, we study the acceptance and respon...
Robert P. Schumaker, Hsinchun Chen
IEEECIT
2010
IEEE
13 years 6 months ago
SAT: A Stream Architecture Template for Embedded Applications
- The increase of embedded applications complexity has demanded hardware more flexible while providing higher performance. Reconfigurable architectures and stream processing have b...
Qianming Yang, Nan Wu, Mei Wen, Yi He, Huayou Su, ...
ESCIENCE
2005
IEEE
14 years 1 months ago
A Distributed Problem Solving Environment (PSE) for Scientific Computing
A distributed Problem Solving Environment (PSE) is proposed to help users solve partial differential equation (PDE) based problems in scientific computing. The system inputs a pro...
Shigeo Kawata, Hideaki Fuju, Hideaki Sugiura, Yuic...