David Kotz,Carl A Gunter,Santosh Kumar et al.
David Kotz et al.
Mobile health technology has great potential to increase healthcare quality, expand access to services, reduce costs, and improve personal wellness and public health. However, mHealth also raises significant privacy and security challenges.
Apostol Vassilev,Robert Staples
Apostol Vassilev
Securing the Internet requires strong cryptography, which depends on the availability of good entropy for generating unpredictable keys and accurate clocks. Attacks abusing weak keys or old inputs portend challenges for the Internet. EaaS i...
J Voas,K Schaffer
J Voas
We asked 7 experts 7 questions to find out what has occurred recently in terms of applying formal methods (FM) to security-centric, cyber problems. We are continually reminded of the 1996 paper by Tony Hoare "How did Software Get So Reliabl...
Tsong Yueh Chen,Fei-Ching Kuo,Wenjuan Ma et al.
Tsong Yueh Chen et al.
Testing is a major approach for the detection of software defects, including vulnerabilities in security features. This article introduces metamorphic testing (MT), a relatively new testing method, and discusses how the new perspective of M...
J Voas,G Hurlburt
J Voas
Current software development has trended toward the idea of integrating independent software sub-functions to create more complete software systems. Software sub-functions are often not homegrown - instead they are developed by unknown 3rd ...
T M Murali
T M Murali
The complexity, diversity, and richness of experimental data on cellular systems are inspiring the development of computational analysis techniques that can directly prioritize and suggest new experiments.
Diane J Cook,Aaron S Crandall,Brian L Thomas et al.
Diane J Cook et al.
While the potential benefits of smart home technology are widely recognized, a lightweight design is needed for the benefits to be realized at a large scale. We introduce the CASAS "smart home in a box", a lightweight smart home design that...
Martin C Herbordt,Tom Vancourt,Yongfeng Gu et al.
Martin C Herbordt et al.
Numerous application areas, including bioinformatics and computational biology, demand increasing amounts of processing capability. In many cases, the computation cores and data types are suited to field-programmable gate arrays. The challe...
Bradford W Hesse,Derek Hansen,Thomas Finholt et al.
Bradford W Hesse et al.
Computer scientists are working with biomedical researchers, policy specialists, and medical practitioners to usher in a new era in healthcare. A recently convened panel of experts considered various research opportunities for technology-me...
Joel Saltz,Tahsin Kurc,Shannon Hastings et al.
Joel Saltz et al.
Translational research projects target a wide variety of diseases, test many different kinds of biomedical hypotheses, and employ a large assortment of experimental methodologies. Diverse data, complex execution environments, and demanding ...