Sciweavers

1085 search results - page 103 / 217
» Active Mining in a Distributed Setting
Sort
View
HCI
2007
13 years 11 months ago
Interfacing Safety and Communication Breakdowns: Situated Medical Technology Design
Safety-critical medical work requires an error-minded approach for design of the technologies that support its processes. We define the requirements that such a framework should me...
Svetlena Taneva, Effie Law
IDA
2007
Springer
13 years 10 months ago
WWW traffic measure and its properties
Abstract. We present a method to extract a time series (Number of Active Requests (NAR)) from web cache logs which serves as a transport level measurement of internet traffic. This...
Marcus R. Keogh-Brown, Barbara Bogacka

Presentation
945views
12 years 3 months ago
A Decentralized Method for Maximizing k-coverage Lifetime in WSNs
In this paper, we propose a decentralized method for maximizing lifetime of data collection wireless sensor networks (WSNs) by making minimal number of nodes operate and putting ot...
SDM
2010
SIAM
218views Data Mining» more  SDM 2010»
13 years 11 months ago
Confidence-Based Feature Acquisition to Minimize Training and Test Costs
We present Confidence-based Feature Acquisition (CFA), a novel supervised learning method for acquiring missing feature values when there is missing data at both training and test...
Marie desJardins, James MacGlashan, Kiri L. Wagsta...
IJMI
2007
140views more  IJMI 2007»
13 years 10 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson