Results 61 to 70 of about 1,328,609 (285)

SCRHM: A Secure Continuous Remote Health Monitoring System

open access: yesInternational Journal of Distributed Sensor Networks, 2015
With the growing need for the remote caring at home and the everincreasing popularity of mobile devices, more and more applications are being developed to enable remote health monitoring. Combining cloud computing with mobile technologies has enabled the
Qiuxiang Dong   +3 more
doaj   +1 more source

Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li   +10 more
wiley   +1 more source

Sound and Complete Runtime Security Monitor for Application Software [PDF]

open access: yes, 2016
Conventional approaches for ensuring the security of application software at run-time, through monitoring, either produce (high rates of) false alarms (e.g. intrusion detection systems) or limit application performance (e.g. run-time verification).
Khan, Muhammad Taimoor   +2 more
core   +1 more source

Preferences for Posttraumatic Osteoarthritis Prevention Strategies in Individuals With Anterior Cruciate Ligament Injury

open access: yesArthritis Care &Research, EarlyView.
Objective There is growing interest in evaluating new strategies to delay or prevent posttraumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury. Methods Participants with a history of
Kevin Kennedy   +9 more
wiley   +1 more source

Validation of the Pediatric Arthritis Ultrasound Scoring System for the Elbow, Wrist, and Finger Joints in Children With Juvenile Idiopathic Arthritis

open access: yesArthritis Care &Research, EarlyView.
Objective We aimed to validate the Pediatric Arthritis Ultrasound Scoring System (PAUSS) for upper extremity joints in children with juvenile idiopathic arthritis (JIA). Methods Children with JIA were evaluated for elbow, wrist, or finger arthritis by clinical examination (CE) and musculoskeletal ultrasound (MSUS) with images scored according to the ...
Patricia Vega‐Fernandez   +12 more
wiley   +1 more source

A proposed case for the cloud software engineering in security [PDF]

open access: yes, 2014
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core  

Association Between Symptomatic Knee Osteoarthritis and Target Glycemic Control in Individuals With Type 2 Diabetes

open access: yesArthritis Care &Research, EarlyView.
Objective Knee osteoarthritis (OA) commonly affects individuals with type 2 diabetes (T2DM) and is associated with increased risk of diabetes‐related complications. To better understand potential mechanisms, we examined the association between symptomatic knee OA and glycemic control in individuals with T2DM.
Lauren K. King   +10 more
wiley   +1 more source

Secure Scrum: Development of Secure Software with Scrum

open access: yes, 2015
Nowadays, the use of agile software development methods like Scrum is common in industry and academia. Considering the current attacking landscape, it is clear that developing secure software should be a main concern in all software development projects.
Hof, Hans-Joachim, Pohl, Christoph
core  

Web development evolution: the business perspective on security [PDF]

open access: yes, 2006
Protection of data, information, and knowledge is a hot topic in today’s business environment. Societal, legislative and consumer pressures are forcing companies to examine business strategies, modify processes and acknowledge security to accept and ...
Glisson, L.M.   +2 more
core  

Heuristic Methods for Security Protocols

open access: yes, 2009
Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security ...
Nizamani, Qurat ul Ain, Tuosto, Emilio
core   +2 more sources

Home - About - Disclaimer - Privacy