Sciweavers

3474 search results - page 672 / 695
» Data Management in RFID Applications
Sort
View
179
Voted
IHI
2010
197views Healthcare» more  IHI 2010»
14 years 10 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
133
Voted
TMI
2010
219views more  TMI 2010»
14 years 10 months ago
Registration of 4D Cardiac CT Sequences Under Trajectory Constraints With Multichannel Diffeomorphic Demons
Abstract--We propose a framework for the nonlinear spatiotemporal registration of 4D time-series of images based on the Diffeomorphic Demons (DD) algorithm. In this framework, the ...
Jean-Marc Peyrat, Herve Delingette, Maxime Sermesa...
137
Voted
EDBT
2011
ACM
209views Database» more  EDBT 2011»
14 years 7 months ago
An optimal strategy for monitoring top-k queries in streaming windows
Continuous top-k queries, which report a certain number (k) of top preferred objects from data streams, are important for a broad class of real-time applications, ranging from fi...
Di Yang, Avani Shastri, Elke A. Rundensteiner, Mat...
131
Voted
SIGIR
2011
ACM
14 years 6 months ago
Social context summarization
We study a novel problem of social context summarization for Web documents. Traditional summarization research has focused on extracting informative sentences from standard docume...
Zi Yang, Keke Cai, Jie Tang, Li Zhang, Zhong Su, J...
164
Voted
SIGMOD
2011
ACM
242views Database» more  SIGMOD 2011»
14 years 6 months ago
The SystemT IDE: an integrated development environment for information extraction rules
Information Extraction (IE) — the problem of extracting structured information from unstructured text — has become the key enabler for many enterprise applications such as sem...
Laura Chiticariu, Vivian Chu, Sajib Dasgupta, Thil...