Sciweavers

480 search results - page 69 / 96
» A practical bottleneck detection method
Sort
View
JAMIA
2011
68views more  JAMIA 2011»
12 years 12 months ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
ISESE
2006
IEEE
14 years 3 months ago
PBR vs. checklist: a replication in the n-fold inspection context
Inspection is considered a powerful method to check software documents for defects. Many published work shows that inspections in requirements specification phase are particularly...
Lulu He, Jeffrey C. Carver
ACCV
2010
Springer
13 years 11 months ago
Ghost-free High Dynamic Range Imaging
Most high dynamic range image (HDRI) algorithms assume stationary scene for registering multiple images which are taken under different exposure settings. In practice, however, the...
Yong Seok Heo (Seoul National University), Kyoung ...
SAS
2012
Springer
208views Formal Methods» more  SAS 2012»
11 years 11 months ago
Finding Non-terminating Executions in Distributed Asynchronous Programs
Programming distributed and reactive asynchronous systems is complex due to the lack of synchronization between concurrently executing tasks, and arbitrary delay of message-based c...
Michael Emmi, Akash Lal
SDM
2007
SIAM
143views Data Mining» more  SDM 2007»
13 years 10 months ago
Less is More: Compact Matrix Decomposition for Large Sparse Graphs
Given a large sparse graph, how can we find patterns and anomalies? Several important applications can be modeled as large sparse graphs, e.g., network traffic monitoring, resea...
Jimeng Sun, Yinglian Xie, Hui Zhang, Christos Falo...