Sciweavers

1398 search results - page 236 / 280
» Medical Database Security
Sort
View
ISWC
2002
IEEE
14 years 2 months ago
Threat Response: A Compelling Application for Wearable Computing
This paper explores the application of wearable computer systems to threat response, exemplified by the Multi-functional Micro-controllable Interface Module (MMIM)/Digital Militar...
Noa M. Rensing, Evan Weststrate, Paul M. Zavracky,...
VLDB
2001
ACM
96views Database» more  VLDB 2001»
14 years 2 months ago
Architectures for Internal Web Services Deployment
There is a new emerging world of web services. In this world, services will be combined in innovative ways to form elaborate services out of building blocks of other services. Thi...
Oded Shmueli
AINA
2010
IEEE
14 years 1 months ago
Empirical Analysis of Attackers Activity on Multi-tier Web Systems
—Web-based systems commonly face unique set of vulnerabilities and security threats due to their high exposure, access by browsers, and integration with databases. In this paper ...
Katerina Goseva-Popstojanova, Brandon Miller, Rist...
MEDIAFORENSICS
2010
13 years 11 months ago
Efficient estimation of CFA pattern configuration in digital camera images
This paper proposes an efficient method to determine the concrete configuration of the color filter array (CFA) from demosaiced images. This is useful to decrease the degrees of f...
Matthias Kirchner
DMIN
2006
115views Data Mining» more  DMIN 2006»
13 years 11 months ago
Privacy Preserving in Clustering using Fuzzy Sets
Data mining techniques, in spite of their benefit in a wide range of applications have also raised threat to privacy and data security. This paper addresses the problem of preservi...
S. Srinivasa Rao 0002, K. V. S. V. N. Raju, P. Kus...