Sciweavers

4413 search results - page 756 / 883
» Security for biometric data
Sort
View
148
Voted
SSWMC
2004
15 years 5 months ago
A hybrid scheme for encryption and watermarking
Encryption and watermarking are complementary lines of defense in protecting multimedia content. Recent watermarking techniques have therefore been developed independent from encr...
Xiaowei Xu, Scott D. Dexter, Ahmet M. Eskicioglu
125
Voted
BMCBI
2008
121views more  BMCBI 2008»
15 years 3 months ago
iRefIndex: A consolidated protein interaction database with provenance
Background: Interaction data for a given protein may be spread across multiple databases. We set out to create a unifying index that would facilitate searching for these data and ...
Sabry Razick, George Magklaras, Ian M. Donaldson
144
Voted
TKDE
2008
134views more  TKDE 2008»
15 years 3 months ago
Sensor-Based Abnormal Human-Activity Detection
With the availability of affordable sensors and sensor networks, sensor-based human-activity recognition has attracted much attention in artificial intelligence and ubiquitous comp...
Jie Yin, Qiang Yang, Jeffrey Junfeng Pan
160
Voted
ANOR
2011
175views more  ANOR 2011»
14 years 10 months ago
Integrated exact, hybrid and metaheuristic learning methods for confidentiality protection
A vital task facing government agencies and commercial organizations that report data is to represent the data in a meaningful way and simultaneously to protect the confidentialit...
Fred Glover, Lawrence H. Cox, Rahul Patil, James P...
JBI
2010
212views Bioinformatics» more  JBI 2010»
14 years 10 months ago
Cloud computing: A new business paradigm for biomedical information sharing
We examine how the biomedical informatics (BMI) community, especially consortia that share data and applications, can take advantage of a new resource called cloud computing. Clou...
Arnon Rosenthal, Peter Mork, Maya Hao Li, Jean Sta...