Results 61 to 70 of about 1,328,609 (285)
SCRHM: A Secure Continuous Remote Health Monitoring System
With the growing need for the remote caring at home and the everincreasing popularity of mobile devices, more and more applications are being developed to enable remote health monitoring. Combining cloud computing with mobile technologies has enabled the
Qiuxiang Dong +3 more
doaj +1 more source
Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li +10 more
wiley +1 more source
Sound and Complete Runtime Security Monitor for Application Software [PDF]
Conventional approaches for ensuring the security of application software at run-time, through monitoring, either produce (high rates of) false alarms (e.g. intrusion detection systems) or limit application performance (e.g. run-time verification).
Khan, Muhammad Taimoor +2 more
core +1 more source
Objective There is growing interest in evaluating new strategies to delay or prevent posttraumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury. Methods Participants with a history of
Kevin Kennedy +9 more
wiley +1 more source
Objective We aimed to validate the Pediatric Arthritis Ultrasound Scoring System (PAUSS) for upper extremity joints in children with juvenile idiopathic arthritis (JIA). Methods Children with JIA were evaluated for elbow, wrist, or finger arthritis by clinical examination (CE) and musculoskeletal ultrasound (MSUS) with images scored according to the ...
Patricia Vega‐Fernandez +12 more
wiley +1 more source
A proposed case for the cloud software engineering in security [PDF]
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core
Objective Knee osteoarthritis (OA) commonly affects individuals with type 2 diabetes (T2DM) and is associated with increased risk of diabetes‐related complications. To better understand potential mechanisms, we examined the association between symptomatic knee OA and glycemic control in individuals with T2DM.
Lauren K. King +10 more
wiley +1 more source
Secure Scrum: Development of Secure Software with Scrum
Nowadays, the use of agile software development methods like Scrum is common in industry and academia. Considering the current attacking landscape, it is clear that developing secure software should be a main concern in all software development projects.
Hof, Hans-Joachim, Pohl, Christoph
core
Web development evolution: the business perspective on security [PDF]
Protection of data, information, and knowledge is a hot topic in today’s business environment. Societal, legislative and consumer pressures are forcing companies to examine business strategies, modify processes and acknowledge security to accept and ...
Glisson, L.M. +2 more
core
Heuristic Methods for Security Protocols
Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security ...
Nizamani, Qurat ul Ain, Tuosto, Emilio
core +2 more sources

