Search
for Author
All Reviews
Lee, Wei
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
5
of
7
reviews
A HIPAA-compliant key management scheme with revocation of authorization
Lee W., Lee C., Ho K. Computer Methods and Programs in Biomedicine 113(3): 809-814, 2014. Type: Article
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates the privacy and accessibility of the electronic protected health information (ePHI) of patients. Ideally, patients should be able to securely authorize ac...
...
May 13 2014
An efficient cache strategy for improving images’ quality
Cheng H., Wu T., Lee W. ICIMCS 2009 (Proceedings of the 1st International Conference on Internet Multimedia Computing and Service, Kunming, Yunnan, China, Nov 23-25, 2009) 49-52, 2009. Type: Proceedings
Distributing videos to Internet users in real time will always be a challenging problem. A client-server-based architecture faces the predicament of server capability when handling a flux of requests. Therefore, peer-to-peer (P2P) syst...
...
May 21 2010
Practical .NET 2.0 networking projects
Lee W., Apress, Berkeley, CA, 2007. 300 pp. Type: Book (9781590597903)
When I was young,
Popular Science
and
Popular Mechanics
published articles describing projects that a technically minded youth could undertake. With tools, supplies, and time, one could build a toy rocket, a motor-driven ...
...
Aug 28 2007
Programming Sudoku
Lee W., Apress, Berkeley, CA, 2006. 232 pp. Type: Book (9781590596623)
The number puzzle Sudoku, originally conceived in the United States in 1979, was relatively unknown until its reintroduction from Japan in 2005. Now, it is as commonplace as the crossword puzzle in most daily papers. The puzzle consist...
...
Oct 26 2006
Windows XP unwired
Lee W., O’Reilly & Associates, Inc., Sebastopol, CA, 2003. Type: Book (9780596005368)
Although it is aimed at those with some background in how to use Windows XP, this book is not overly ornate, or peppered with buzzwords that only computer science professionals can understand. It is therefore appropriate for the averag...
...
Mar 19 2004
Display
5
10
15
25
50
100
per column
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy