Sciweavers

5252 search results - page 1047 / 1051
» Logic in Access Control
Sort
View
IHI
2010
160views Healthcare» more  IHI 2010»
13 years 2 months ago
Securing the e-health cloud
Modern information technology is increasingly used in healthcare with the goal to improve and enhance medical services and to reduce costs. In this context, the outsourcing of com...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
TITB
2010
128views Education» more  TITB 2010»
13 years 2 months ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...
VRIPHYS
2010
13 years 2 months ago
Optimization-based Fluid Simulation on Unstructured Meshes
We present a novel approach to fluid simulation, allowing us to take into account the surface energy in a precise manner. This new approach combines a novel, topology-adaptive app...
Marek Krzysztof Misztal, Robert Bridson, Kenny Erl...
MICROMACHINES
2011
13 years 2 months ago
Modeling Self-Assembly Across Scales: The Unifying Perspective of Smart Minimal Particles
: A wealth of current research in microengineering aims at fabricating devices of increasing complexity, notably by (self-)assembling elementary components into heterogeneous funct...
Massimo Mastrangeli, Grégory Mermoud, Alche...
CORR
2011
Springer
199views Education» more  CORR 2011»
12 years 11 months ago
STiCMAC: A MAC Protocol for Robust Space-Time Coding in Cooperative Wireless LANs
Relay-assisted cooperative wireless communication has been shown to have significant performance gains over the legacy direct transmission scheme. Compared with single relay base...
Pei Liu, Chun Nie, Thanasis Korakis, Elza Erkip, S...
« Prev « First page 1047 / 1051 Last » Next »