Sciweavers

410 search results - page 49 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
CBMS
2008
IEEE
14 years 2 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
TCC
2005
Springer
139views Cryptology» more  TCC 2005»
14 years 1 months ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen
MICCAI
2004
Springer
14 years 8 months ago
Bone Motion Analysis from Dynamic MRI: Acquisition and Tracking
For diagnosis, preoperative planning and postoperative guides, an accurate estimate of joints kinematics is required. We bring together MRI developments and new image processing me...
Benjamin Gilles, Rosalind Perrin, Nadia Magnenat-T...
DATE
2009
IEEE
125views Hardware» more  DATE 2009»
14 years 2 months ago
Finite precision processing in wireless applications
—Complex signal processing algorithms are often specified in floating point precision. Thus, a type conversion is needed when the targeted platform requires fixed-point precis...
David Novo, Min Li, Bruno Bougard, Liesbet Van der...
BDIM
2008
IEEE
185views Business» more  BDIM 2008»
14 years 2 months ago
Addressing the impact of business process changes on software user interfaces
—This paper defines an approach to maintain the work of business process analysts aligned with the work of UI designers. With this approach, models are derived from each other an...
Kênia Soares Sousa, Hildeberto Mendonç...