Sciweavers

408 search results - page 66 / 82
» Tailoring Privacy to Users' Needs
Sort
View
CP
2008
Springer
13 years 9 months ago
Elicitation Strategies for Fuzzy Constraint Problems with Missing Preferences: Algorithms and Experimental Studies
Fuzzy constraints are a popular approach to handle preferences and over-constrained problems in scenarios where one needs to be cautious, such as in medical or space applications. ...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
ISPEC
2011
Springer
12 years 11 months ago
Traitor Tracing against Public Collaboration
Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some ...
Xingwen Zhao, Fangguo Zhang
CAISE
2000
Springer
14 years 9 days ago
Design Principles for Application Integration
Application integration is a major trend in information technology today. In this paper we present a number of principles for the design, validation and presentation of process mod...
Paul Johannesson, Erik Perjons
WSC
1997
13 years 9 months ago
MedModel - Healthcare Simulation Software
In response to the expressed needs of MedModel users, PROMODEL Corporation has made substantial improvements in its MedModel healthcare simulation software. Beginning with its inc...
Steve H. Denney
BMCBI
2005
179views more  BMCBI 2005»
13 years 7 months ago
MARS: Microarray analysis, retrieval, and storage system
Background: Microarray analysis has become a widely used technique for the study of geneexpression patterns on a genomic scale. As more and more laboratories are adopting microarr...
Michael Maurer, Robert Molidor, Alexander Sturn, J...