Sciweavers

2805 search results - page 552 / 561
» Collecting More Garbage
Sort
View
TDSC
2011
13 years 3 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
WWW
2011
ACM
13 years 3 months ago
Network bucket testing
Bucket testing, also known as A/B testing, is a practice that is widely used by on-line sites with large audiences: in a simple version of the methodology, one evaluates a new fea...
Lars Backstrom, Jon M. Kleinberg
FIRA
2010
Springer
156views Robotics» more  FIRA 2010»
13 years 3 months ago
Attracting Students to Engineering: Using Intuitive HRIs for Educational Purposes
Today, industrialized countries are facing a major problem, the lack of skilled engineers. Despite the increasing demand for engineers in the labor market, the number of students g...
Pedro Neto, Nuno Mendes, Nélio Mourato, J. ...
IHI
2010
136views Healthcare» more  IHI 2010»
13 years 3 months ago
Modeling and estimating the spatial distribution of healthcare workers
This paper describes a spatial model for healthcare workers' location in a large hospital facility. Such models have many applications in healthcare, such as supporting timea...
Donald Ephraim Curtis, Christopher S. Hlady, Srira...
JAMIA
2010
116views more  JAMIA 2010»
13 years 3 months ago
Extracting Rx information from clinical narrative
Objective The authors used the i2b2 Medication Extraction Challenge to evaluate their entity extraction methods, contribute to the generation of a publicly available collection of...
James G. Mork, Olivier Bodenreider, Dina Demner-Fu...