Sciweavers

1795 search results - page 72 / 359
» Security Models and Information Flow
Sort
View
BILDMED
2008
212views Algorithms» more  BILDMED 2008»
13 years 11 months ago
3D Blood Flow Reconstruction from 2D Angiograms
A method for 3-d blood flow reconstruction is presented. Given a 3-d volume of a vessel tree and a 2-d sequence of angiograms, the propagation information can be back-projected int...
Esther-Sabrina Platzer, Frank Deinzer, Dietrich Pa...
HICSS
2007
IEEE
151views Biometrics» more  HICSS 2007»
14 years 4 months ago
The Impact of Information Technology on the Temporal Optimization of Supply Chain Performance
The objective of this paper is to suggest a systematic means by which the timing and focus of information technology policies can be used to optimize supply chain performance and ...
Ken Dozier, David Chang
VIZSEC
2004
Springer
14 years 3 months ago
NVisionIP: netflow visualizations of system state for security situational awareness
The number of attacks against large computer systems is currently growing at a rapid pace. Despite the best efforts of security analysts, large organizations are having trouble k...
Kiran Lakkaraju, William Yurcik, Adam J. Lee
WIKIS
2010
ACM
13 years 7 months ago
Toward sensitive information redaction in a collaborative, multilevel security environment
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, gove...
Peter Gehres, Nathan Singleton, George Louthan, Jo...