18 results

Ethical assessment in e-Health

Conference Proceeding
Gonzalez-Pinto, A., Ruiz de Azua, S., Mival, O. H., Thuernmler, C., Jumelle, A. K. L., Ispas, I., …González-Pinto, A. (2015)
Ethical assessment in e-Health. In 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 262-268. https://doi.org/10.1109/healthcom.2014.7001852
While innovative e-Health and m-Health technologies and solutions will eventually change the way health and social care are delivered, it raises many challenges regarding what...

On the design of scalable pipelined broadcasting for mesh networks

Conference Proceeding
Al-Dubai, A., & Ould-Khaoua, M. (2002)
On the design of scalable pipelined broadcasting for mesh networks. In High Performance Computing Systems and Applications, 98-105. https://doi.org/10.1109/HPCSA.2002.1019140
Minimising the communication latency and achieving considerable scalability are of paramount importance when designing high performance broadcast algorithms. Many algorithms f...

A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors

Conference Proceeding
Kumar Mishra, A., Kumar Tripathy, A., Obaidat, M. S., Tan, Z., Prasad, M., Sadoun, B., & Puthal, D. (2018)
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, (89-98). https://doi.org/10.5220/0006850602550264
Due to lack of an efficient monitoring system to periodically record environmental parameters for food grain storage, a huge loss of food grains in storage is reported every y...

Investigating false positive reduction in HTTP via procedure analysis.

Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006)
Investigating false positive reduction in HTTP via procedure analysis. https://doi.org/10.1109/ICNS.2006.65
This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection sys...

Integrated many-to-many multicast addressing and access control method

Conference Proceeding
Romdhani, I., & Yassin Al-Dubai, A. (2009)
Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...

A scalable plane-based broadcast algorithm for 3D-Mesh networks

Conference Proceeding
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2002)
A scalable plane-based broadcast algorithm for 3D-Mesh networks. In Proceedings of the Eleventh Euromicro Conference on Parallel,Distributed and Network-Based Processing (Euro-PDP’03), 149-156. doi:10.1109/empdp.2003.1183581
Broadcast algorithms for wormhole–switched meshes have been widely reported in the literature. However, most of these algorithms handle broadcast in a sequential manner and do...

Determinants of Next Generation e-Health Network and Architecture Specifications

Conference Proceeding
Thuemmler, C., Paulin, A., & Lim, A. K. (2016)
Determinants of Next Generation e-Health Network and Architecture Specifications. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), (233-238). https://doi.org/10.1109/HealthCom.2016.7749460
This paper summarizes the determinants for future e-Health network and IT infrastructures in the health care environment. The paper bases on observations conducted as part of ...

A social-technological alignment matrix.

Conference Proceeding
Thuemmler, C., Mival, O., Lim, A. K., Holanec, I., & Fricker, S. (2015)
A social-technological alignment matrix. In 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom), 200-205. https://doi.org/10.1109/healthcom.2014.7001841
This paper refers to the term " implementation " as the Especially in health care this has proven to be a very critical phase Although strategies such as requirements engineer...

Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet

Conference Proceeding
Paulin, A., & Thuemmler, C. (2016)
Dynamic fine-grained access control in e-Health using: The secure SQL server system as an enabler of the future Internet. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom),, (245-248). https://doi.org/10.1109/HealthCom.2016.7749462
This paper describes the use of the Secure SQL Server system (SecSQL) – a system for dynamic fine-grained access control, in the context of e-Health. The system was used in tw...

On balancing traffic load in path-based multicast communication.

Conference Proceeding
Al-Dubai, A., Ould-Khaoua, M., El-Zayyat, K., & Mackenzie, L. (2002)
On balancing traffic load in path-based multicast communication. In SPECTS '03, 533-540
Multicast is the most primitive collective capability of any message-passing network. It is itself central to many important parallel applications in Science and Engineering b...