Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Dartmouth College

Computer Science Technical Reports

2012

Articles 1 - 6 of 6

Full-Text Articles in Physical Sciences and Mathematics

Privacy-Preserving Screen Capture: Closing The Loop For Medical Informatics Usability, Joseph Cooley, Sean Smith Jul 2012

Privacy-Preserving Screen Capture: Closing The Loop For Medical Informatics Usability, Joseph Cooley, Sean Smith

Computer Science Technical Reports

As information technology permeates healthcare (particularly provider-facing systems), maximizing system effectiveness requires the ability to document and analyze tricky or troublesome usage scenarios. However, real-world medical applications are typically replete with privacy-sensitive data regarding patients, diagnoses, clinicians, and EMR user interface details; any instrumentation for screen capture (capturing and recording the scenario depicted on the screen) needs to respect these privacy constraints. Furthermore, real-world medical informatics systems are typically composed of modules from many sources, mission-critical and often closed-source; any instrumentation for screen capture cannot rely on access to structured output or software internals. In this paper, we present a …


Meshgit: Diffing And Merging Polygonal Meshes, Jonathan D. Denning, Fabio Pellacini May 2012

Meshgit: Diffing And Merging Polygonal Meshes, Jonathan D. Denning, Fabio Pellacini

Computer Science Technical Reports

This paper presents MeshGit, a practical algorithm for diffing and merging polygonal meshes. Inspired by version control for text editing, we introduce the mesh edit distance as a measure of the dissimilarity between meshes. This distance is defined as the minimum cost of matching the vertices and faces of one mesh to those of another. We propose an iterative greedy algorithm to approximate the mesh edit distance, which scales well with model complexity, providing a practical solution to our problem. We translate the mesh correspondence into a set of mesh editing operations that transforms the first mesh into the second. …


Toward Evaluating Progressive Rendering Methods In Appearance Design Tasks, Jiawei Ou, Ondrej Karlik, Jaroslav Krivanek, Fabio Pellacini May 2012

Toward Evaluating Progressive Rendering Methods In Appearance Design Tasks, Jiawei Ou, Ondrej Karlik, Jaroslav Krivanek, Fabio Pellacini

Computer Science Technical Reports

Progressive rendering is becoming a popular alternative to precomputation approaches for appearance design tasks. Images created by different progressive algorithms exhibit various kinds of visual artifacts at the early stages of computation. We present a user study that investigates the effects of these artifacts on user performance in appearance design tasks. Specifically, we ask both novice and expert subjects to perform lighting and material editing tasks with the following algorithms: random path tracing, quasi-random path tracing, progressive photon mapping, and virtual point light (VPL) rendering. Data collected from the experiments suggest that path tracing is strongly preferred to progressive photon …


Access Control Realities As Observed In A Clinical Medical Setting, Sara Sinclair, Sean Smith Apr 2012

Access Control Realities As Observed In A Clinical Medical Setting, Sara Sinclair, Sean Smith

Computer Science Technical Reports

Effective computer security requires looking not just at technology, but also at how it meshes with users in the real-world enterprises depending on it. As part of a longer-term series of projects, we have been looking at these issues-- particularly access control-- in a variety of real-world enterprises. In previous work, we looked at companies in the finance and software industries; this paper reports on a study of a hospital's access control systems. Both studies employ ethnographic methods to elicit observations on the failures of current access control technologies in large, dynamic organizations; participants in the corporate study were largely …


Access Control Hygiene And The Empathy Gap In Medical It, Yifei Wang, Sean Smith, Andrew Gettinger Apr 2012

Access Control Hygiene And The Empathy Gap In Medical It, Yifei Wang, Sean Smith, Andrew Gettinger

Computer Science Technical Reports

In theory, access control is a solved problem. In practice, large real-world enterprises still report trouble: de facto policy becomes unmanageable; users circumvent controls. These issues can be particularly critical in medical IT, such as emerging EMR and EHR, where access control errors can have serious repercussions. In this paper, we investigate how real-world EMR users think about access control when they are making policy decisions in the abstract---and when they are actually using the system in treatment scenarios. Mismatches suggest places ("empathy gaps") where new policy tools may be needed.


Wallpaper Maps, M. Douglas Mcilroy Mar 2012

Wallpaper Maps, M. Douglas Mcilroy

Computer Science Technical Reports

A wallpaper map is a conformal projection of a spherical earth onto regular polygons with which the plane can be tiled continuously. A complete set of distinct wallpaper maps that satisfy certain natural symmetry conditions is derived and illustrated. Though all of the projections have been published before, the family had not been characterized as a whole. Some wallpaper maps generalize to one-parameter subfamilies in which the sphere is pre-transformed by a conformal automorphism.