Sciweavers

878 search results - page 117 / 176
» Factors and effects of information credibility
Sort
View
CBMS
2008
IEEE
14 years 2 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...
IAT
2007
IEEE
14 years 2 months ago
Revisiting ADOPT-ing and its Feedback Schemes
Here we revisit ADOPT-ing and bring two new contributions. One contribution consists of developing variations on the algorithms keeping the improvement in length of chain of causa...
Marius-Calin Silaghi, Makoto Yokoo
ICC
2007
IEEE
14 years 2 months ago
Peak-to-Average Power Ratio Reduction in MIMO OFDM
—Peak-to-average power ratio (PAR) reduction in OFDM using antenna arrays (MIMO OFDM) is considered. In particular, generalizations of selected mapping (SLM) recently proposed in...
Robert F. H. Fischer, Martin Hoch
UIST
2006
ACM
14 years 1 months ago
Viz: a visual analysis suite for explaining local search behavior
NP-hard combinatorial optimization problems are common in real life. Due to their intractability, local search algorithms are often used to solve such problems. Since these algori...
Steven Halim, Roland H. C. Yap, Hoong Chuin Lau
VRST
2006
ACM
14 years 1 months ago
Mixed reality: are two hands better than one?
For simulating hands-on tasks, the ease of enabling two-handed interaction with virtual objects gives Mixed Reality (MR) an expected advantage over Virtual Reality (VR). A user st...
Aaron Kotranza, John Quarles, Benjamin Lok