Search
Now showing items 711-720 of 752
Cloud computing without seeing
(
Association for Computing Machinery
, 2011 , Conference Paper)
In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ...
Automatic verification of health regulatory compliance in cloud computing
(
IEEE
, 2013 , Conference Paper)
This paper aims to develop an approach that enables cloud computing clients to verify health regulatory compliance claimed by cloud computing providers. In this approach, clients of cloud computing could check automatically ...
Social access control language (SocACL)
(
Association for Computing Machinery
, 2013 , Conference Paper)
Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ...
Tracking and constraining authorization provenance
(
Springer Berlin Heidelberg
, 2012 , Conference Paper)
Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ...
A Process Model for Customisation of Software in Multi-tenant SaaS Model
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper outlines a generic process framework for customisation of software in cloud computing. The flexibility for client-specific customisation of the software offered by software-as-a-service (SaaS) is limited. The ...
Color-based Fuzzy Classifier for automated detection of cancerous cells in histopathological analysis
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In usual clinical practice, grading of cancer tissues is often done by an expert histopathologist based on their analysis of micro-level architectural features of the cancerous tissue specimen as well as level of presence ...
Time-frequency based signal restoration for laser-ultrasound signals with applications in nondestructive testing
(
IEEE
, 2011 , Conference Paper)
In this paper, an inspection system has been presented that uses Laser-Ultrasound (LU) technique for Nondestructive testing (NDT) of metallic structures with specific interest in Oil & Gas sector. While the developed ...
Fuzzy prediction of complications in craniopathy
(
IEEE
, 2011 , Conference Paper)
Decompressive craniectomy is a neurosurgical procedure in which part of the skull is removed to allow a swelling brain room to expand. It is a life-saving procedure used in the treatment of medically refractory intracranial ...
Parametric modeling of EEG signals with real patient data for simulating seizures and pre-seizures
(
IEEE
, 2013 , Conference Paper)
Numerous theories and models have been developed to associate various findings or in relating EEG patterns to develop a software simulators. In this paper, a Dynamic model for simulating the EEG signal has been developed ...
On critical point avoidance among mobile terminals in healthcare monitoring applications: Saving lives through reliable communication software
(
IEEE
, 2012 , Conference Paper)
The advances in Microelectromechanical systems (MEMS), battery life, low powered communication standards, more capable processing units, and hybrid communication have cemented the use of mobile Wireless Body Area Networks ...