Sciweavers

886 search results - page 47 / 178
» Generalized Bezout Identity
Sort
View
IHI
2012
353views Healthcare» more  IHI 2012»
12 years 4 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad
ICIP
2004
IEEE
14 years 11 months ago
Separating useful from useless image variation for face recognition
For a general purpose face recognition system one of the largest challenge is to separate useful identity related from useless variations in the image data due to nuisance variabl...
Peter Kalocsai
ICDCSW
2007
IEEE
14 years 3 months ago
Automated Ensemble Extraction and Analysis of Acoustic Data Streams
This paper addresses the design and use of distributed pipelines for automated processing of sensor data streams. In particular, we focus on the detection and extraction of meanin...
Eric P. Kasten, Philip K. McKinley, Stuart H. Gage
GMP
2006
IEEE
102views Solid Modeling» more  GMP 2006»
14 years 3 months ago
Representing Topological Structures Using Cell-Chains
Abstract. A new topological representation of surfaces in higher dimensions, “cell-chains” is developed. The representation is a generalization of Brisson’s cell-tuple data s...
David E. Cardoze, Gary L. Miller, Todd Phillips
ICDE
2006
IEEE
141views Database» more  ICDE 2006»
14 years 3 months ago
Privacy Protection: p-Sensitive k-Anonymity Property
In this paper, we introduce a new privacy protection property called p-sensitive k-anonymity. The existing kanonymity property protects against identity disclosure, but it fails t...
Traian Marius Truta, Bindu Vinay