Emmanuel Benoist

Emmanuel Benoist
Bern University of Applied Sciences | BFH · Department of Engineering and Information Technology

PhD

About

26
Publications
2,692
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
73
Citations
Additional affiliations
October 1999 - present
Bern University of Applied Sciences
Position
  • Professor (Full)
October 1999 - present
Bern University of Applied Sciences
Position
  • Professor (Full)
Description
  • Teaching computer science courses: Algorithmic and data structures (1999 -2007) Web Programming (1999- 2014) Assembly and C language programming (2014 - ) Web Programming with Java (2002 - )

Publications

Publications (26)
Book
Full-text available
From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized u...
Chapter
Smart, networked medical devices play a rapidly growing role in healthcare. Those devices and their data have to be integrated into the healthcare system. There are several reasons to reuse those data for well-defined purposes by well-defined partners; this reuse should be controlled by the patient and not depend on the manufacturer infrastructure....
Chapter
The rise of internet of things (IoT) in medicine has generated tons of new data through connected devices. Medicine and research in medicine are interested in using those data for the personalization of patients' treatment. The authors present the system MIDATA where patients can transfer their medical IoT data and store them. They have also the po...
Data
Full-text available
Data
Full-text available
Conference Paper
The goal of some medical databases is not to support the actual treatment of individual patients, but to provide the platform for medical research. Health data collected in such databases have to be anynomized - they should be analyzed only statistically and should not permit to retrieve the patient’s identity. Medical data collected for research s...
Conference Paper
In the current trend towards the evidence based medicine we should not forget previously collected data, neither in hand-written records nor in legacy systems. In this paper we present a process to integrate the data gathered by therapeutic machines of our industrial partner used for treatment of neurological and orthopedic disorders. These devices...
Conference Paper
In this paper we discuss the privacy aware management of data streams generated by wireless sensor networks (WSN) in medical applications. Such data are primarily used to ensure the direct health support for a specific patient. They can also be used for other purposes, like quality assurance of applied devices and comparative evaluation research of...
Article
Full-text available
In this paper, the authors present a novel Web based architecture of a medical registry with enhanced protection of personal data of the patients. The goal of a medical registry is to gather experience from clinical practice concerning a disease or treatment e.g., hip replacement and to improve the future treatments by applying adequate methods and...
Conference Paper
The problem of data protection in medical research regards various communities, among them: patients, doctors, approval authorities, researchers, technology suppliers, privacy protectors and lawyers. Therefore it can be seen from many perspectives. In particular, it seems to be common to underestimate the inherent difficulty of obtaining the scient...
Article
Emerging Health Information Technologies (HIT) such as Electronic Health Record (EHR) and PHR systems and Heath Information Exchanges (HIEs) facilitate access to and sharing of patients' medical data distributed in different HIT systems. One of the many ...
Article
Pervasive computing systems will provoke a massive transformation of our civilization. Wireless sensor networks will permit to gather information about the world and to act on it at an unprecedentedly detailed level. Wearable or implanted devices will improve our health condition. But also less friendly applications are to be expected, like robot s...
Article
Wireless sensor networks permit to gather information about the world and to act on it at an unprecedentedly detailed level. They are transforming profoundly the way we live as individuals and interact with the society and our environment. In the medical context they can be used at following levels: (1) direct monitoring and supporting the health o...
Chapter
Full-text available
What is a virtual person? What is it used for? What is its added value? Virtual persons sometimes describe avatars and new forms of identities in online games. They also appear in other contexts; some authors use them in the legal domain. Within FIDIS, the concept of virtual person has been extended in order to better describe and understand new fo...
Chapter
Internet technology allows web site administrators to monitor users visiting their sites. In the beginning the basic protocol used for the web (http) did not consider the concept of a session. It was impossible to recognise whether two requests came from the same user. Developers then found ways to follow visitors and implemented logins and shoppin...
Conference Paper
During the last decade, Internet-voting (i-voting) moved from the field of fundamental research to practical application. First, we will see that theoretical research provides satisfying algorithms for some of the challenges raised by i-voting and that some real world experiments have already been developed and performed. Unfortunately, in current...
Article
The enlarged Horn formulas generalize the extended Horn formulas introduced by Chandru and Hooker (1991). Their satisfying truth assignments can be generated with polynomial delay. Unfortunately no polynomial algorithm is known for recognizing enlarged Horn formulas or extended Horn formulas. In this paper we define the class of simple enlarged Hor...

Network

Cited By

Projects

Project (1)