Default Cover Image

ASE/IEEE International Conference on BioMedical Computing (BioMedCom)

Dec. 14 2012 to Dec. 16 2012

Washington, DC, USA USA

ISBN: 978-1-4673-5495-0

Table of Contents

Papers
[BioMedCom 2012 Copyright notice]Freely available from IEEE.pp. iv
Message from the Organizing CommitteesFreely available from IEEE.pp. viii-viii
Papers
BioMedCom 2012 Program Committee MembersFreely available from IEEE.pp. ix
Papers
3-D Tomosynthesis Image Reconstruction Using Total VariationFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
Affymetrix® Mismatch (MM) Probes: Useful after AllFull-text access may be available. Sign in or learn about subscription options.pp. 6-13
Papers
A Process for Visualizing Disordered Molecular Data with a Case Study in Bulk WaterFull-text access may be available. Sign in or learn about subscription options.pp. 34-42
Papers
Study of HRV Dynamics and Comparison Using Wavelet Analysis and Pan Tompkins AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 43-49
Papers
Towards an Optimizing Model for Older People at Risk of FallsFull-text access may be available. Sign in or learn about subscription options.pp. 55-58
Papers
A Framework for Model Checking of Large Scale Disease Spread ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 59-61
Papers
Early Results from Metamorphic Testing of Epidemiological ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 62-67
Papers
A Modular Testing Environment for Implementation AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 86-95
Papers
S*FSM: A Paradigm Shift for Attack Resistant FSM Designs and EncodingsFull-text access may be available. Sign in or learn about subscription options.pp. 96-100
Papers
Scalable and Reusable Attack Aware SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 101-104
Papers
READ -- A Resolution and Abduction Based Approach for Policy Comparison in Organizational CollaborationFull-text access may be available. Sign in or learn about subscription options.pp. 105-112
Papers
Security Engineering and Modelling of Set-Top BoxesFull-text access may be available. Sign in or learn about subscription options.pp. 113-122
Papers
2TAC: Distributed Access Control Architecture for "Bring Your Own Device" SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 123-126
Papers
A Misuse Pattern for Retrieving Data from a Database Using SQL InjectionFull-text access may be available. Sign in or learn about subscription options.pp. 127-131
Papers
Introducing Security Building Block ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 132-139
Papers
A Pattern for Software-as-a-Service in CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 140-144
Papers
Security Engineering Based on Structured Formal ReasoningFull-text access may be available. Sign in or learn about subscription options.pp. 145-152
Papers
Author index - Vol 3Freely available from IEEE.pp. 153
Showing 32 out of 32