Sciweavers

650 search results - page 28 / 130
» Privacy in Non-private Environments
Sort
View
JAMIA
2011
140views more  JAMIA 2011»
13 years 23 days ago
Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule
Objective Healthcare organizations must de-identify patient records before sharing data. Many organizations rely on the Safe Harbor Standard of the HIPAAPrivacy Rule, which enumer...
Bradley Malin, Kathleen Benitez, Daniel R. Masys
SP
2002
IEEE
134views Security Privacy» more  SP 2002»
13 years 9 months ago
Performance engineering, PSEs and the GRID
Performance Engineering is concerned with the reliable prediction and estimation of the performance of scientific and engineering applications on a variety of parallel and distrib...
Tony Hey, Juri Papay
EUC
2007
Springer
14 years 4 months ago
An Activity-Centered Wearable Computing Infrastructure for Intelligent Environment Applications
There are many research efforts that focus on converting everyday environments into intelligent and computationally active environments that support and enhance the abilities of it...
Dipak Surie, Thomas Pederson
ESORICS
2004
Springer
14 years 3 months ago
ARCHERR: Runtime Environment Driven Program Safety
Parameters of a program’s runtime environment such as the machine architecture and operating system largely determine whether a vulnerability can be exploited. For example, the m...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
AGENTS
1997
Springer
14 years 2 months ago
Modeling an Environment: Agents in Character Feature Extraction
A feature extraction system based on artificial life concepts is presented. The system provides automatic character feature extraction through the local actions of autonomous feat...
Lijia Zhou, Stan Franklin