Sciweavers

14895 search results - page 2971 / 2979
» Evaluating The Regret System
Sort
View
JAMIA
2011
68views more  JAMIA 2011»
12 years 11 months ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
JCDL
2011
ACM
301views Education» more  JCDL 2011»
12 years 11 months ago
Archiving the web using page changes patterns: a case study
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of a data having generally some recurrent events. Patterns have received a considerab...
Myriam Ben Saad, Stéphane Gançarski
JSS
2011
114views more  JSS 2011»
12 years 11 months ago
An approach to process continuous location-dependent queries on moving objects with support for location granules
Location-based services have attracted the attention of important research in the field of mobile computing. Specifically, different mechanisms have been proposed to process loc...
Sergio Ilarri, Carlos Bobed, Eduardo Mena
NAR
2011
216views Computer Vision» more  NAR 2011»
12 years 11 months ago
ChemProt: a disease chemical biology database
Systems pharmacology is an emergent area that studies drug action across multiple scales of complexity, from molecular and cellular to tissue and organism levels. There is a criti...
Olivier Taboureau, Sonny Kim Nielsen, Karine Audou...
NETWORKING
2011
12 years 11 months ago
Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point
Short-range, point-to-point communications for mobile users enjoy increasing popularity, particularly with the rise in Bluetooth-equipped mobile devices. Unfortunately, virus write...
Nicholas Valler, B. Aditya Prakash, Hanghang Tong,...
« Prev « First page 2971 / 2979 Last » Next »