منابع مشابه
Trusted Launch of Generic Virtual Machine Images in Public IaaS Environments
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their faster-pased adoption is hampered by data security concerns. In the same time, Trusted Computing (TC) is experiencing a revived interest as a security mechanism for IaaS. We address the lack of an implementable mechanism to ensure the launch of a virtual machine (VM) instance on a trust...
متن کاملHandwritten Text Image Authentication using Back Propagation
Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it’s packaging and labelling claims to be, or assuring that a computer program is a trusted one. The authentication of information can pose special problems (especially man-in-the-middl...
متن کاملStatus of this Memo Middlebox Communication Architecture and framework
There are a variety of intermediate devices in the Internet today that require application intelligence for their operation. Datagrams pertaining to real-time streaming applications such as SIP and H.323 and peer-to-peer applications such as Napster and NetMeeting cannot be identified by merely examining packet headers. Middleboxes implementing Firewall and Network Address Translator services t...
متن کاملUsing Coronal Depth Maps to Detect Identifiable Surface Features on Structural Head Imaging
Sharing medical images is becoming increasing crucial for knowledge discovery in medicine and science. An important issue associated with image sharing is the potential for a breach of patient privacy. Prior work has primarily focused on removing identifying metadata such as name, age or sex from image headers. However, there remains the potential for images being identified directly from the i...
متن کاملLogo and Text Removal for Medical Image Retrieval
The amount of visual medical information being produced in large hospitals is exploding. Most University hospitals produce Millions of images per year (Geneva Radiology: 20’000 images per day). Currently, the access to these images is most often limited to an access by patient identification. Sometimes search by text in the radiology report or in the DICOM headers is possible. Still, all the im...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999