Sciweavers

897 search results - page 30 / 180
» Identity: How to name it, How to find it
Sort
View
DKE
2002
137views more  DKE 2002»
13 years 8 months ago
Reasoning for Web document associations and its applications in site map construction
Recently, there is an interest in using associations between web pages in providing users with pages relevant to what they are currently viewing. We believe that, to enable intell...
K. Selçuk Candan, Wen-Syan Li
IHI
2010
142views Healthcare» more  IHI 2010»
13 years 3 months ago
Exploring the use of technology in healthcare spaces and its impact on empathic communication
As computing technologies in examination rooms become a more pervasive and dominant part of the healthcare experience, those technologies can disrupt the flow of information and e...
Amanda Fonville, Eun Kyoung Choe, Susan Oldham, Ju...
CHI
2009
ACM
13 years 12 months ago
I just don't know why it's gone: maintaining informal information use in inpatient care
We conducted a field-based study examining informal nursing information. We examined the use of this information before and after the adoption of a CPOE (Computerized Provider Ord...
Xiaomu Zhou, Mark S. Ackerman, Kai Zheng
DATAMINE
2008
143views more  DATAMINE 2008»
13 years 8 months ago
Automatically countering imbalance and its empirical relationship to cost
Learning from imbalanced datasets presents a convoluted problem both from the modeling and cost standpoints. In particular, when a class is of great interest but occurs relatively...
Nitesh V. Chawla, David A. Cieslak, Lawrence O. Ha...
CSREASAM
2006
13 years 10 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson