Discovering and mining use case model in reverse engineering

Q Li, S Hu, P Chen, L Wu… - … Conference on Fuzzy …, 2007 - ieeexplore.ieee.org
Use case model is normally used to model software requirement. Reverse engineering of
the high-level requirement model from the source code of target system is an important way …

A telemonitoring framework for android devices

D Aranki, G Kurillo, A Mani, P Azar… - 2016 IEEE First …, 2016 - ieeexplore.ieee.org
Real-time telemonitoring of patient's well-being through various wearable sensors and other
electronic accessories holds promise to provide better quality healthcare at lower costs. The …

[PDF][PDF] Privacy-Aware Remote Mobile Health and Fitness Monitoring: Extending the Functionality of The Berkeley Telemonitoring Framework

K Du, R Bajcsy, A Javey, D Aranki - 2017 - eecs.berkeley.edu
Unregulated sensitive data which are “not legally regulated but still considered sensitive due
to proprietary, ethical, or privacy considerations,” can infer regulated sensitive data like …