Sciweavers

2710 search results - page 349 / 542
» Knowledge Management with Snapshots
Sort
View
SECURWARE
2008
IEEE
15 years 10 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
TABLETOP
2008
IEEE
15 years 10 months ago
DocuDesk: An interactive surface for creating and rehydrating many-to-many linkages among paper and digital documents
Knowledge workers often undertake tasks that involve a variety of information artifacts, including both paper and digital documents. In this paper, we first summarize findings fro...
Katherine Everitt, Meredith Ringel Morris, A. J. B...
FBIT
2007
IEEE
15 years 10 months ago
Classification of Cell Membrane Proteins
Membrane proteins are an important class of proteins that serve as channels, receptors, and energy transducers in a cell membrane. Knowledge of a given type of cell membrane prote...
Seyed Koosha Golmohammadi, Lukasz A. Kurgan, Brend...
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
15 years 10 months ago
Challenges in Health Informatics
Early grand challenge papers in health informatics identified numerous challenges, many of which either remain as open questions or have been resolved within fairly narrow domains...
Michael A. Shepherd
HICSS
2007
IEEE
150views Biometrics» more  HICSS 2007»
15 years 10 months ago
Security Ontologies: Improving Quantitative Risk Analysis
— IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-se...
Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, E...