Sciweavers

41650 search results - page 8283 / 8330
» Distribution of
Sort
View
JAMIA
2011
68views more  JAMIA 2011»
12 years 12 months ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
JCDL
2011
ACM
301views Education» more  JCDL 2011»
12 years 12 months ago
Archiving the web using page changes patterns: a case study
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of a data having generally some recurrent events. Patterns have received a considerab...
Myriam Ben Saad, Stéphane Gançarski
JCDL
2011
ACM
272views Education» more  JCDL 2011»
12 years 12 months ago
CollabSeer: a search engine for collaboration discovery
Collaborative research has been increasingly popular and important in academic circles. However, there is no open platform available for scholars or scientists to effectively dis...
Hung-Hsuan Chen, Liang Gou, Xiaolong Zhang, Clyde ...
JOCN
2011
115views more  JOCN 2011»
12 years 12 months ago
Differential Involvement of Somatosensory and Interoceptive Cortices during the Observation of Affective Touch
■ Previous studies suggested that the observation of other individualsʼ somatosensory experiences also activates brain circuits processing oneʼs own somatosensory experiences....
Sjoerd J. H. Ebisch, Francesca Ferri, Anatolia Sal...
JSAC
2011
136views more  JSAC 2011»
12 years 12 months ago
Spectrum Trading in Cognitive Radio Networks: A Contract-Theoretic Modeling Approach
—Cognitive radio is a promising paradigm to achieve efficient utilization of spectrum resource by allowing the unlicensed users (i.e., secondary users, SUs) to access the licens...
Lin Gao, Xinbing Wang, Youyun Xu, Qian Zhang
« Prev « First page 8283 / 8330 Last » Next »