A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
SPIKE: Secure and Private Investigation of the Kidney Exchange problem
[article]
2022
arXiv
pre-print
The kidney exchange problem (KEP) addresses the matching of patients in need for a replacement organ with compatible living donors. ...
The usage of MPC techniques fulfills many data protection requirements on a technical level, allowing smaller health care providers to directly participate in a kidney exchange with reduced legal processes ...
Acknowledgements Many thanks to Ulrich Zwirner for sharing his medical knowledge during our fruitful discussions. ...
arXiv:2204.09937v1
fatcat:j5zdorzc2zh4bjp4kqdtfdxtiu
Negative representations of information
2009
International Journal of Information Security
I would like to thank my Dad, Mom and Sister; Mom, Dad and Sister; Sister, Mom and Dad; Mom, Sister and Dad; Dad, Sister and Mom; Sister, Dad and Mom in no particular order and with all my heart. ...
Among these are the Russel and Rao, Jaccard and Needham, and the Rogers and Tanimoto similarity functions (see [73] for a good review of these functions). ...
One interesting property of this approach is that there is no explicit derivation of a target function and membership is determined locally; there is no training of a neural net nor an explicit construction ...
doi:10.1007/s10207-009-0078-1
fatcat:yg4ss2ul7rbvdewypzrxmvpcni
Category Definitions
[chapter]
2017
Clinical Informatics Literacy
In the natural sciences and engineering, measurements do not apply to nominal properties (i.e., properties with no magnitude) of objects or events. ...
filtering
Computational complexity
Conditional decision trees
Convolutional neural network (CNN)
Crowdsourcing
Cryptographic hashing functions
Data compression algorithm
Decision stump
Decision ...
Professional Organization Most often a nonprofit organization with the goal of furthering the mission of a particular profession, maintaining control, or oversight of the legitimate practice of those in ...
doi:10.1016/b978-0-12-803206-0.00001-8
fatcat:ts57p4xi2nflrpo4j5jthqov4u
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model Checker
2012
IOSR Journal of Computer Engineering
In order to enhance the security of conventional OLSR Protocol trust is incorporated as additional security measure in the functioning of the protocol. ...
To validate the improved version of the protocol a technique of formal modeling and verification is used by the utilization of established Model Checker I-SPIN and PROMELA language for validation of Trusted ...
Shilong Ma in Beijing University of Aeronautics and Astronautics (BUAA), China. This work was supported in part by Prof. Dr. Mohammed Sakre, AL-Shorouk Academy, Egypt. ...
doi:10.9790/0661-0410105
fatcat:2ye2jbyhyzgclnjrmctzwkivwa
Special issue on information reuse and integration
2007
IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics)
In this study, we identify learners (from a total of 11 classification algorithms) with robust performance in the presence of low quality imbalanced measurement data. ...
Learners were evaluated using analysis of variance models based on their performance as the level of injected noise, the number of attributes with noise, and the percentage of minority instances containing ...
Maria Ganzha, for her consideration of this paper.
Acknowledgement The author would like to thank Szymon Grabowski and Jakub Swacha for suggestions of possible improvements. ...
doi:10.1109/tsmcb.2007.912701
fatcat:xvhlaf4m3vhcdb2cicqtfrug6m
A Review of Intrusion Detection Systems and Their Evaluation in the IoT
[article]
2021
arXiv
pre-print
The specifics of these very constrained devices render the design of an IDS capable of dealing with the varied attacks a very challenging problem and a very active research subject. ...
In this article, we review works on IDS specifically for these kinds of devices from 2008 to 2018, collecting a total of 51 different IDS papers. ...
is a boolean. ...
arXiv:2105.08096v1
fatcat:5gzpin2jxnajnema34pn744gry
FOUR GENEALOGIES FOR A RECOMBINANT ANTHROPOLOGY OF SCIENCE AND TECHNOLOGY
2007
Cultural Anthropology
Other such interdisciplinary spaces include the kinetic ways crystallographers who with 3-D simulation algorithms figure out functionally significant complicated folding patterns, that wet biologists must ...
"magic words" as performing similarly). 33 SSK, SHOT, and ANT's publicity success made the "science wars" of the 1990s possible, both for good (the Hollywood slogan "all publicity is good") and for bad ...
doi:10.1525/can.2007.22.4.539
fatcat:gbifat35nvhx5kmfy5dlrdllqu
Special Issue: Ant Colonies and Multi-Agent Systems Guest Editors: Nadia Nedjah Luiza de Macedo Mourelle
unpublished
A framework for construction of virtual models of the medical phenomena is proposed. Major construction steps are discussed in detail. ...
Model checking method is a widely used formal method for proving whether or not a given model satisfies properties, and for producing counter examples if the model does not satisfy properties. ...
Loy for his help in generating the contour graphs. ...
fatcat:u7nd4jn3jbbjrczrovyu24o4be
FUTURE COMPUTING 2011 Editors FUTURE COMPUTING 2011 Foreword FUTURE COMPUTING 2011 Committee FUTURE COMPUTING Advisory Chairs FUTURE COMPUTING 2011 Technical Program Committee
2011
The Third International Conference on Future Computational Technologies and Applications
unpublished
We hope that FUTURE COMPUTING 2011 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the field of future computational ...
We are grateful to the members of the FUTURE COMPUTING 2011 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success. ...
ACKNOWLEDGEMENT The first author thanks the Japan Society for Promotion of Science for its support. ...
fatcat:j7ogr5v54vfqvk5m6wip53k7sa
Battery-based intrusion detection
IEEE Global Telecommunications Conference, 2004. GLOBECOM '04.
HIDE works in conjunction with a Scan Port Intrusion Engine (SPIE) that ascertains the IP and port source of the attack and with a host analysis signature trace engine (HASTE) that determines the energy ...
technique that operates through the implementation of smart battery-based intrusion detection (B-bid) on mobile devices, such as PDAs, HandPCs and smart-phones by correlating attacks with their impact ...
This includes such tasks as debugging the computer code, testing for logic errors, and testing the functionality of different constructs and function calls. ...
doi:10.1109/glocom.2004.1378409
dblp:conf/globecom/JacobyD04
fatcat:hf7moxbuajed7f33e6igoki2wy
Considering Software Protection for Embedded Systems The authors examine the nature of adversarial reverse-engineering attacks on reconfigurable computing technologies-such as field-programmable gate arrays-and provide protection measures
CROSSTALK The Journal of Defense Software Engineering
unpublished
Acknowledgements The works described in this article are sponsored in part by the Office of Naval Research, the National Science Foundation, Lockheed Martin, Rockwell Collins, and the SEI. ...
Many have contributed to this work, and I thank all of our collaborators in developing these ideas and case studies, including Artur Boronat, Darren Cofer, Peter Feiler, Steve Miller, Peter Ölveczky, Joe ...
By composing a circuit with a semantically strong data encryption algorithm, the resulting program exhibits input/output relationships with desirable cryptographic properties. ...
fatcat:itk5d24sqjdofieactubjyqoc4
Workshop on Trustworthy Software OASIcs-OpenAccess Series in Informatics
unpublished
Acknowledgments: We would like to thank Luigi Liquori for his inside full reading on a preliminary version of this paper, Pierre Weis and Germain Faure for useful comments on this work. ...
We also thank the anonymous referees for valuable comments and suggestions that led to a substantial improvement of the paper. ...
In practice, TICC computes the set of good states Good, which is simply the complement of the set of locally incompatible states. ...
fatcat:7pxedcysnzgkfotrwgtejv6qci
Development of cheminformatics-based methods for computational prediction of off-target activities
[article]
2017
This approach led to the identification of novel binding site for acyclovir in the peptide binding groove of the human leukocyte antigen (HLA) specific allele. ...
Additionally, regulatory authorities from Europe and United States of America have recognized the risk associated with combined exposure to multiple chemicals. ...
InChIKey generates two blocks using a truncated SHA-256 cryptographic hash function based on InChI. ...
doi:10.18452/17789
fatcat:5jox4mh3sfdkxnwfpzsptzhn2a
Basic Bioethics Glenn McGee and Arthur Caplan, series editors What Genes Can't Do
unpublished
Acknowledgments The following individuals contributed to the realization of this work and have my everlasting gratitute: Mina Bissell, Paddy Blanchette, Jeff ...
, to speak in the idiom of design because we have a natural algorithm with which to do it. ...
In the Boolean model, the activation state of each gene can be computed on the basis of one of 16 possible Boolean functions (randomly assigned)-e.g., AND, OR, If, and so forth-as well as input received ...
fatcat:fb3plb5hbndcji3umybjexwmju