In many applications involving composite Web services, one or more component services may become unavailable. This presents us with the problem of identifying other components tha...
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
In a conventional eye department of hospital, an optometrist samples the eyes of a patient with medical instruments (e.g. camera, ophthalmoscope), and then delivers the medical rec...
Paper-based folders have been widely used to coordinate cares in medical-social networks, but they introduce some burning issues (e.g. privacy protection, remote access to the fol...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, K&ea...
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...