Search results
From LIMSWiki
Jump to navigationJump to search
- ...ing and Associated Mitigation Techniques |journal=International Journal of Computer Applications |author=Bhadauria, R.; Sanyal, S. |volume=47 |issue=18 |pages= ...ucture as a Service |journal=International Journal of Advanced Research in Computer Science and Software Engineering |author=Arora, P.; Wadhawan, R.C.; Ahuja,56 KB (7,679 words) - 18:43, 6 October 2021
- Journal:Registered data-centered lab management system based on data ownership security architecture...In the current study, a design was proposed to save all the related public keys to the DAC, and the private key is kept by their client, without placing it ...ork adopted RSA and AES algorithms, as well as Chinese domestic commercial keys SM2 and SM4, to compare the aspects of addressing efficiency and security o61 KB (8,423 words) - 21:32, 31 July 2023
- ...ervice in cloud |journal=International Journal of Societal Applications of Computer Science |author=Tandel, S.T.; Shah, V.K.; Hiranwal, S. |volume=2 |issue=8 | ...Data Auditing Approaches for Cloud Data |journal=International Journal of Computer Applications Technology and Research |author=Dabas, P.; Wadhwa, D. |volume=93 KB (14,047 words) - 00:38, 27 March 2019
- ...Data Mining. Applications and Theoretical Aspects |series=Lecture Notes in Computer Science |author=Elgendy N.; Elragal A. |editor=Perner, P. |publisher=Spring ...on Big Data Analytics in Medical Imaging |journal=International Journal of Computer Engineering and Applications |author=Mishra, S. |volume=12 |issue=1 |year=279 KB (11,900 words) - 23:58, 11 April 2024
- ...wnloaded 40 papers from the ACM Digital Library, 57 articles from the IEEE Computer Society's Digital Library, and 43 from the IEEE Xplore library to provide a ...re a healthcare center integrates system data and information via a global computer network such as the internet, the more global risk that is placed into the60 KB (8,281 words) - 20:49, 19 September 2021
- ...te instead of an insert operation. Our concept, which is similar to unique keys in [[Relational database#RDBMS|relational database management systems]] (RD ...ronization procedure using a crawler. Data acquisition (possibly including computer simulations or data produced during data analysis) leads to a variety of fi61 KB (9,171 words) - 17:50, 11 June 2024
- Databases are one of the main concepts developed in the 1980s in the computer sciences. Many different approaches in terms of technology and data models ...D (common alternative). At decision time, only Propel managed such kind of keys.54 KB (8,381 words) - 00:09, 3 October 2018
- ...to extract private keys |journal=Proceedings of the 2012 ACM Conference on Computer and Communications Security |author=Zhang, Y.; Juels, A.; Reiter, M.K. et a ...phone clone co-location over mobile clouds |journal=Journal of Network and Computer Applications |author=Vaezpour, S.Y.; Zhang, R.; Wi, K. et al. |volume=62 |p44 KB (6,151 words) - 18:54, 14 October 2019
- ...rl=https://linkinghub.elsevier.com/retrieve/pii/S0267364918300827 |journal=Computer Law & Security Review |language=en |volume=34 |issue=5 |pages=1000–1018 | ...pproach is analogous to the treatment of pseudonymized data and encryption keys under the GDPR.<ref name=":2" /> When handed to a third party without the m91 KB (12,825 words) - 19:20, 7 February 2023
- ...urnal |title=NetCDF: An interface for scientific data access |journal=IEEE Computer Graphics and Applications |author=Rew, R.; Davis, G. |volume=10 |issue=4 |p ...|journal=IADIS International Conference Computer Graphics, Visualization, Computer Vision and Image Processing 2009 |volume=2009 |pages=49–56 |year=2009 |is77 KB (11,266 words) - 22:34, 20 February 2017
- ...//linkinghub.elsevier.com/retrieve/pii/S1877050921003033 |journal=Procedia Computer Science |language=en |volume=180 |pages=436–445 |doi=10.1016/j.procs.2021 ...//linkinghub.elsevier.com/retrieve/pii/S1877050921002167 |journal=Procedia Computer Science |language=en |volume=181 |pages=341–346 |doi=10.1016/j.procs.2021101 KB (14,131 words) - 21:01, 1 March 2023
- ...opic evolution in the bioinformatics field using DBLP data in the field of computer science. To identify topic trends over time, they divided a dozen years (20 ...ckground-color:white; padding-left:10px; padding-right:10px;"|''Journal of Computer-Aided Molecular Design''95 KB (11,675 words) - 19:55, 13 June 2017
- ...o execute the contents of any cell, the user can press the Shift and Enter keys together, or alternatively click on the “Run” button in the main menu b ...nuary 2020}}</ref> LaTeX is widely used by the scientific community (e.g., computer scientists) to write academic publications (journal and conference papers).55 KB (8,118 words) - 23:41, 22 May 2021
- ...data: A state of art study |journal=Proceedings of the 13th International Computer Engineering Conference |author=Abd El-Ghafar, R.M.; Gheith, M.H.; El-Bastaw ...ta-blocking, and a block purging process to remove high-frequency blocking keys. Mestre ''et al.''<ref name="MestreAnEffic17">{{cite journal |title=An effi68 KB (9,594 words) - 18:38, 22 December 2020
- ...chema is created ''a priori'' and aims to provide a generic description of computer-aided engineering data, while the second schema is created ''a posteriori'' ...h as the specification of a selection of valid values for certain metadata keys. Wherever possible, automatically recorded metadata is also available in ea54 KB (7,990 words) - 20:11, 24 February 2021
- ...g:5px; width:500px;" |'''d.''' The system allows for the use of navigation keys to freely move from field to field. ...width:500px;" |'''n.''' The system directs output from ad-hoc queries to a computer file for subsequent analysis by other software.86 KB (10,886 words) - 00:04, 12 April 2024
- ...g:5px; width:500px;" |'''d.''' The system allows for the use of navigation keys to freely move from field to field. ...width:500px;" |'''p.''' The system directs output from ad-hoc queries to a computer file for subsequent analysis by other software.94 KB (11,888 words) - 00:04, 12 April 2024
- ...context, a computer security incident response team (CSIRT; also known as computer emergency response team or CERT) network has been established, which counts The U.K. National Computer Emergency Response Team CERT-UK, together with the U.K.’s Centre for the75 KB (9,816 words) - 19:15, 27 October 2020
- ...mothy L. |date=2014-01-01 |title=Healthcare Cybersecurity Risk Management: Keys To an Effective Plan |url=https://doi.org/10.2345/0899-8205-48.s1.26 |journ ...e.org/document/8787402/ |journal=2019 IEEE 32nd International Symposium on Computer-Based Medical Systems (CBMS) |pages=162–167 |doi=10.1109/CBMS.2019.00042}100 KB (13,544 words) - 18:31, 6 October 2021
- Today, they are mostly on the computer, and they have to type everything, so they have very little time to dedicat ...ould talk to me for a whole minute, and then spend 4 minutes typing on his computer. (Patient 13)83 KB (11,483 words) - 00:18, 8 March 2024