Sciweavers

6696 search results - page 1291 / 1340
» Securing social networks
Sort
View
IEEESCC
2009
IEEE
14 years 3 months ago
Web Service Substitution Based on Preferences Over Non-functional Attributes
In many applications involving composite Web services, one or more component services may become unavailable. This presents us with the problem of identifying other components tha...
Ganesh Ram Santhanam, Samik Basu, Vasant Honavar
FC
2009
Springer
112views Cryptology» more  FC 2009»
14 years 3 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson
PCM
2009
Springer
97views Multimedia» more  PCM 2009»
14 years 3 months ago
Evaluating a Multimedia-Based Tele-Ophthalmology System
In a conventional eye department of hospital, an optometrist samples the eyes of a patient with medical instruments (e.g. camera, ophthalmoscope), and then delivers the medical rec...
Yongdong Wu, Haixia Yao, Zhigang Zhao
CBMS
2008
IEEE
14 years 3 months ago
Restoring the Patient Control over Her Medical History
Paper-based folders have been widely used to coordinate cares in medical-social networks, but they introduce some burning issues (e.g. privacy protection, remote access to the fol...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, K&ea...
CEC
2008
IEEE
14 years 3 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
« Prev « First page 1291 / 1340 Last » Next »