Sciweavers

1459 search results - page 94 / 292
» An authorization model for temporal data
Sort
View
JAMIA
2011
140views more  JAMIA 2011»
14 years 7 months ago
Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule
Objective Healthcare organizations must de-identify patient records before sharing data. Many organizations rely on the Safe Harbor Standard of the HIPAAPrivacy Rule, which enumer...
Bradley Malin, Kathleen Benitez, Daniel R. Masys
CHI
2009
ACM
15 years 8 months ago
Computer usage in daily life
In this paper we explore the use of computer at home. This work is based on the automatic recording of application focus data in natural situation from a wide representative panel...
Thomas Beauvisage
CSCW
2012
ACM
14 years 11 days ago
Come meet me at Ulduar: progression raiding in world of warcraft
In spite of decades of research on virtual worlds, our understanding of one popular form of virtual world behavior— raiding—remains limited. Raiding is important because it en...
Jeffrey Bardzell, Jeffrey Nichols, Tyler Pace, Sha...
ACSD
2008
IEEE
114views Hardware» more  ACSD 2008»
15 years 11 months ago
Modeling and verifying asynchronous communication mechanisms using coloured Petri nets
Asynchronous data communication mechanisms (ACMs) have been extensively studied as data connectors between independently timed concurrent processes. In previous work, two automati...
Kyller Costa Gorgônio, Fei Xia
ICDM
2009
IEEE
141views Data Mining» more  ICDM 2009»
15 years 11 months ago
Discovering Excitatory Networks from Discrete Event Streams with Applications to Neuronal Spike Train Analysis
—Mining temporal network models from discrete event streams is an important problem with applications in computational neuroscience, physical plant diagnostics, and human-compute...
Debprakash Patnaik, Srivatsan Laxman, Naren Ramakr...