Sciweavers

1544 search results - page 211 / 309
» The Process of Adoption
Sort
View
SP
2006
IEEE
102views Security Privacy» more  SP 2006»
15 years 10 months ago
Secure Device Pairing based on a Visual Channel (Short Paper)
Recently several researchers and practitioners have begun to address the problem of how to set up secure communication between two devices without the assistance of a trusted thir...
Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N...
DMSN
2006
ACM
15 years 10 months ago
Impact of multi-query optimization in sensor networks
In this paper, we study the problem of processing multiple queries in a wireless sensor network. We focus on multiquery optimization at the base station level to minimize the numb...
Shili Xiang, Hock-Beng Lim, Kian-Lee Tan
SAC
2006
ACM
15 years 10 months ago
Approaches to text mining for clinical medical records
Clinical medical records contain a wealth of information, largely in free-text form. Means to extract structured information from free-text records is an important research endeav...
Xiaohua Zhou, Hyoil Han, Isaac Chankai, Ann Prestr...
UIST
2006
ACM
15 years 10 months ago
CINCH: a cooperatively designed marking interface for 3D pathway selection
To disentangle and analyze neural pathways estimated from magnetic resonance imaging data, scientists need an interface to select 3D pathways. Broad adoption of such an interface ...
David Akers
APSEC
2005
IEEE
15 years 9 months ago
Ontology-based Active Requirements Engineering Framework
Software-intensive systems are systems of systems that rely on complex interdependencies among themselves as well as with their operational environment to satisfy the required beh...
Seok Won Lee, Robin A. Gandhi