Sciweavers

1398 search results - page 73 / 280
» Medical Database Security
Sort
View
MICCAI
2006
Springer
14 years 10 months ago
A Comparison of Breast Tissue Classification Techniques
It is widely accepted in the medical community that breast tissue density is an important risk factor for the development of breast cancer. Thus, the development of reliable automa...
Arnau Oliver, Jordi Freixenet, Robert Marti, Reyer...
ISBI
2007
IEEE
14 years 3 months ago
Segmentation of Non-convex Regions within Uterine Cervix Images
The National Cancer Institute has collected a large database of uterine cervix images, termed “cervigrams” for cervical cancer screening research. Tissues of interest within t...
Shiri Gordon, Hayit Greenspan
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 10 months ago
Sovereign Joins
We present a secure network service for sovereign information sharing whose only trusted component is an off-theshelf secure coprocessor. The participating data providers send enc...
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu,...
IJNSEC
2008
81views more  IJNSEC 2008»
13 years 9 months ago
A Self-Concealing Mechanism for Authentication of Portable Communication Systems
The challenge-response technique is widely adapted for authentication of portable communication systems. For authentication the user can prove his/her identity via a secret shared...
Wei-Bin Lee, Chang-Kuo Yeh
WSC
2007
13 years 11 months ago
Defense and homeland security applications of multi-agent simulations
Department of Defense and Homeland Security analysts are increasingly using multi-agent simulation (MAS) to examine national security issues. This paper summarizes three MAS natio...
Thomas W. Lucas, Susan M. Sanchez, Felix Martinez,...