14 Hits in 6.9 sec

SPIKE: Secure and Private Investigation of the Kidney Exchange problem [article]

Timm Birka, Kay Hamacher, Tobias Kussel, Helen Möllering, Thomas Schneider
2022 arXiv   pre-print
The kidney exchange problem (KEP) addresses the matching of patients in need for a replacement organ with compatible living donors.  ...  The usage of MPC techniques fulfills many data protection requirements on a technical level, allowing smaller health care providers to directly participate in a kidney exchange with reduced legal processes  ...  Acknowledgements Many thanks to Ulrich Zwirner for sharing his medical knowledge during our fruitful discussions.  ... 
arXiv:2204.09937v1 fatcat:j5zdorzc2zh4bjp4kqdtfdxtiu

Negative representations of information

Fernando Esponda, Stephanie Forrest, Paul Helman
2009 International Journal of Information Security  
I would like to thank my Dad, Mom and Sister; Mom, Dad and Sister; Sister, Mom and Dad; Mom, Sister and Dad; Dad, Sister and Mom; Sister, Dad and Mom in no particular order and with all my heart.  ...  Among these are the Russel and Rao, Jaccard and Needham, and the Rogers and Tanimoto similarity functions (see [73] for a good review of these functions).  ...  One interesting property of this approach is that there is no explicit derivation of a target function and membership is determined locally; there is no training of a neural net nor an explicit construction  ... 
doi:10.1007/s10207-009-0078-1 fatcat:yg4ss2ul7rbvdewypzrxmvpcni

Category Definitions [chapter]

Dean F. Sittig
2017 Clinical Informatics Literacy  
In the natural sciences and engineering, measurements do not apply to nominal properties (i.e., properties with no magnitude) of objects or events.  ...  filtering Computational complexity Conditional decision trees Convolutional neural network (CNN) Crowdsourcing Cryptographic hashing functions Data compression algorithm Decision stump Decision  ...  Professional Organization Most often a nonprofit organization with the goal of furthering the mission of a particular profession, maintaining control, or oversight of the legitimate practice of those in  ... 
doi:10.1016/b978-0-12-803206-0.00001-8 fatcat:ts57p4xi2nflrpo4j5jthqov4u

Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model Checker

Harpreet Kaur
2012 IOSR Journal of Computer Engineering  
In order to enhance the security of conventional OLSR Protocol trust is incorporated as additional security measure in the functioning of the protocol.  ...  To validate the improved version of the protocol a technique of formal modeling and verification is used by the utilization of established Model Checker I-SPIN and PROMELA language for validation of Trusted  ...  Shilong Ma in Beijing University of Aeronautics and Astronautics (BUAA), China. This work was supported in part by Prof. Dr. Mohammed Sakre, AL-Shorouk Academy, Egypt.  ... 
doi:10.9790/0661-0410105 fatcat:2ye2jbyhyzgclnjrmctzwkivwa

Special issue on information reuse and integration

2007 IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics)  
In this study, we identify learners (from a total of 11 classification algorithms) with robust performance in the presence of low quality imbalanced measurement data.  ...  Learners were evaluated using analysis of variance models based on their performance as the level of injected noise, the number of attributes with noise, and the percentage of minority instances containing  ...  Maria Ganzha, for her consideration of this paper. Acknowledgement The author would like to thank Szymon Grabowski and Jakub Swacha for suggestions of possible improvements.  ... 
doi:10.1109/tsmcb.2007.912701 fatcat:xvhlaf4m3vhcdb2cicqtfrug6m

A Review of Intrusion Detection Systems and Their Evaluation in the IoT [article]

Luca Arnaboldi, Charles Morisset
2021 arXiv   pre-print
The specifics of these very constrained devices render the design of an IDS capable of dealing with the varied attacks a very challenging problem and a very active research subject.  ...  In this article, we review works on IDS specifically for these kinds of devices from 2008 to 2018, collecting a total of 51 different IDS papers.  ...  is a boolean.  ... 
arXiv:2105.08096v1 fatcat:5gzpin2jxnajnema34pn744gry


2007 Cultural Anthropology  
Other such interdisciplinary spaces include the kinetic ways crystallographers who with 3-D simulation algorithms figure out functionally significant complicated folding patterns, that wet biologists must  ...  "magic words" as performing similarly). 33 SSK, SHOT, and ANT's publicity success made the "science wars" of the 1990s possible, both for good (the Hollywood slogan "all publicity is good") and for bad  ... 
doi:10.1525/can.2007.22.4.539 fatcat:gbifat35nvhx5kmfy5dlrdllqu

Special Issue: Ant Colonies and Multi-Agent Systems Guest Editors: Nadia Nedjah Luiza de Macedo Mourelle

Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Tomaž Banovec, Ciril Baškovič, Andrej Jerman-Blažič, Jožkočuk Jožkočuk, Vladislav Rajkovič, Ivan Bratko, Marko Jagodič (+14 others)
A framework for construction of virtual models of the medical phenomena is proposed. Major construction steps are discussed in detail.  ...  Model checking method is a widely used formal method for proving whether or not a given model satisfies properties, and for producing counter examples if the model does not satisfy properties.  ...  Loy for his help in generating the contour graphs.  ... 

FUTURE COMPUTING 2011 Editors FUTURE COMPUTING 2011 Foreword FUTURE COMPUTING 2011 Committee FUTURE COMPUTING Advisory Chairs FUTURE COMPUTING 2011 Technical Program Committee

Kendall Nygard, Pascal Lorenz, Miriam Capretz, Hiroyuki Sato, Cristina Seceleanu, Cristina Seceleanu, Mälardalen University, Sweden Sato, Miriam Capretz, Marek Druzdzel, Radu Calinescu, Miriam Capretz (+23 others)
2011 The Third International Conference on Future Computational Technologies and Applications   unpublished
We hope that FUTURE COMPUTING 2011 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the field of future computational  ...  We are grateful to the members of the FUTURE COMPUTING 2011 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.  ...  ACKNOWLEDGEMENT The first author thanks the Japan Society for Promotion of Science for its support.  ... 

Battery-based intrusion detection

G.A. Jacoby, N.J. Davis
IEEE Global Telecommunications Conference, 2004. GLOBECOM '04.  
HIDE works in conjunction with a Scan Port Intrusion Engine (SPIE) that ascertains the IP and port source of the attack and with a host analysis signature trace engine (HASTE) that determines the energy  ...  technique that operates through the implementation of smart battery-based intrusion detection (B-bid) on mobile devices, such as PDAs, HandPCs and smart-phones by correlating attacks with their impact  ...  This includes such tasks as debugging the computer code, testing for logic errors, and testing the functionality of different constructs and function calls.  ... 
doi:10.1109/glocom.2004.1378409 dblp:conf/globecom/JacobyD04 fatcat:hf7moxbuajed7f33e6igoki2wy

Considering Software Protection for Embedded Systems The authors examine the nature of adversarial reverse-engineering attacks on reconfigurable computing technologies-such as field-programmable gate arrays-and provide protection measures

Yong Kim, Lt Col, Mcdonald
CROSSTALK The Journal of Defense Software Engineering   unpublished
Acknowledgements The works described in this article are sponsored in part by the Office of Naval Research, the National Science Foundation, Lockheed Martin, Rockwell Collins, and the SEI.  ...  Many have contributed to this work, and I thank all of our collaborators in developing these ideas and case studies, including Artur Boronat, Darren Cofer, Peter Feiler, Steve Miller, Peter Ölveczky, Joe  ...  By composing a circuit with a semantically strong data encryption algorithm, the resulting program exhibits input/output relationships with desirable cryptographic properties.  ... 

Workshop on Trustworthy Software OASIcs-OpenAccess Series in Informatics

Serge Autexier, Stephan Merz, Leon Van Der Torre, Reinhard Wilhelm, Pierre Wolper, Serge Autexier, Dfki Saarbrücken, Stephan Merz, Reinhard Wilhelm
Acknowledgments: We would like to thank Luigi Liquori for his inside full reading on a preliminary version of this paper, Pierre Weis and Germain Faure for useful comments on this work.  ...  We also thank the anonymous referees for valuable comments and suggestions that led to a substantial improvement of the paper.  ...  In practice, TICC computes the set of good states Good, which is simply the complement of the set of locally incompatible states.  ... 

Development of cheminformatics-based methods for computational prediction of off-target activities [article]

Priyanka Banerjee, Humboldt-Universität Zu Berlin, Humboldt-Universität Zu Berlin
This approach led to the identification of novel binding site for acyclovir in the peptide binding groove of the human leukocyte antigen (HLA) specific allele.  ...  Additionally, regulatory authorities from Europe and United States of America have recognized the risk associated with combined exposure to multiple chemicals.  ...  InChIKey generates two blocks using a truncated SHA-256 cryptographic hash function based on InChI.  ... 
doi:10.18452/17789 fatcat:5jox4mh3sfdkxnwfpzsptzhn2a

Basic Bioethics Glenn McGee and Arthur Caplan, series editors What Genes Can't Do

Lenny Moss, A Book
Acknowledgments The following individuals contributed to the realization of this work and have my everlasting gratitute: Mina Bissell, Paddy Blanchette, Jeff  ...  , to speak in the idiom of design because we have a natural algorithm with which to do it.  ...  In the Boolean model, the activation state of each gene can be computed on the basis of one of 16 possible Boolean functions (randomly assigned)-e.g., AND, OR, If, and so forth-as well as input received  ...