Sciweavers

4413 search results - page 799 / 883
» Security for biometric data
Sort
View
SIGMOD
2007
ACM
172views Database» more  SIGMOD 2007»
16 years 3 months ago
Auditing disclosure by relevance ranking
Numerous widely publicized cases of theft and misuse of private information underscore the need for audit technology to identify the sources of unauthorized disclosure. We present...
Rakesh Agrawal, Alexandre V. Evfimievski, Jerry Ki...
ICSE
2005
IEEE-ACM
16 years 3 months ago
An architects guide to enterprise application integration with J2EE and .NET
Architects are faced with the problem of building enterprise scale information systems, with streamlined, automated internal business processes and web-enabled business functions,...
Ian Gorton, Anna Liu
130
Voted
PERCOM
2006
ACM
16 years 3 months ago
A Programmable Service Architecture for Mobile Medical Care
This paper introduces MobiCare ? a novel service architecture that enables a wide range of health-related services for efficient and mobile patient care. These services include: (...
Rajiv Chakravorty
122
Voted
SC
2009
ACM
15 years 10 months ago
Using dynamic accounts to enable access to advanced resources through science gateways
Science Gateways have emerged as a valuable solution for providing large numbers of users with access to advanced computing resources. Additionally, they can hide many of the comp...
Joseph A. Insley, Ti Leggett, Michael E. Papka
122
Voted
FPGA
2009
ACM
285views FPGA» more  FPGA 2009»
15 years 10 months ago
PERG-Rx: a hardware pattern-matching engine supporting limited regular expressions
PERG is a pattern matching engine designed for locating predefined byte string patterns (rules) from the ClamAV virus signature database in a data stream. This paper presents PERG...
Johnny Tsung Lin Ho, Guy G. Lemieux