Sciweavers

490 search results - page 65 / 98
» Operations on Records
Sort
View
ISMIS
2009
Springer
14 years 3 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
ISW
2009
Springer
14 years 3 months ago
Robust Authentication Using Physically Unclonable Functions
Abstract. In this work we utilize a physically unclonable function (PUF) to improve resilience of authentication protocols to various types of compromise. As an example application...
Keith B. Frikken, Marina Blanton, Mikhail J. Atall...
CBMS
2008
IEEE
14 years 3 months ago
Restoring the Patient Control over Her Medical History
Paper-based folders have been widely used to coordinate cares in medical-social networks, but they introduce some burning issues (e.g. privacy protection, remote access to the fol...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, K&ea...
HICSS
2008
IEEE
106views Biometrics» more  HICSS 2008»
14 years 3 months ago
Of Paper Trails and Voter Receipts
The Internet pervades virtually every aspect of our daily lives, and it seems there is no area that is immune from computing solutions. Computers can do things faster, with greate...
Alec Yasinsac, Matt Bishop
ICMCS
2008
IEEE
135views Multimedia» more  ICMCS 2008»
14 years 3 months ago
Audio and video signatures for synchronization
Abstract— We propose a framework based on signatures extracted from audio and video streams for automatically measuring and maintaining synchronization between the two streams. T...
Regunathan Radhakrishnan, Kent Terry, Claus Bauer