Sciweavers

617 search results - page 88 / 124
» Research Challenges for the Security of Control Systems
Sort
View
DRM
2003
Springer
14 years 2 months ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon
IEEESP
2010
126views more  IEEESP 2010»
13 years 7 months ago
Privacy-Preserving Sharing of Sensitive Information
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
Salvatore J. Stolfo, Gene Tsudik
GECCO
2008
Springer
178views Optimization» more  GECCO 2008»
13 years 10 months ago
Agent Smith: a real-time game-playing agent for interactive dynamic games
The goal of this project is to develop an agent capable of learning and behaving autonomously and making decisions quickly in a dynamic environment. The agent’s environment is a...
Ryan K. Small
CACM
2000
158views more  CACM 2000»
13 years 9 months ago
Wireless Integrated Network Sensors
Wireless Integrated Network Sensors (WINS) now provide a new monitoring and control capability for transportation, manufacturing, health care, environmental monitoring, and safety...
Gregory J. Pottie, William J. Kaiser
HICSS
2009
IEEE
98views Biometrics» more  HICSS 2009»
14 years 4 months ago
Methodological Approaches to Measuring the Effects of Implementation of Health Information Technology (HIT)
The research design, evaluation methodology, and statistical analysis of the clinical efficacy of healthcare information technology (HIT) implementation can be a challenging task....
Lance Roberts, Marcia M. Ward, Jane M. Brokel, Dou...