Sciweavers

104 search results - page 17 / 21
» Mining Electronic Health Records
Sort
View
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
13 years 10 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
KDD
2010
ACM
232views Data Mining» more  KDD 2010»
13 years 10 months ago
Discovering frequent patterns in sensitive data
Discovering frequent patterns from data is a popular exploratory technique in data mining. However, if the data are sensitive (e.g. patient health records, user behavior records) ...
Raghav Bhaskar, Srivatsan Laxman, Adam Smith, Abhr...
KDD
2007
ACM
192views Data Mining» more  KDD 2007»
14 years 7 months ago
Allowing Privacy Protection Algorithms to Jump Out of Local Optimums: An Ordered Greed Framework
Abstract. As more and more person-specific data like health information becomes available, increasing attention is paid to confidentiality and privacy protection. One proposed mode...
Rhonda Chaytor
KDD
2005
ACM
104views Data Mining» more  KDD 2005»
14 years 7 months ago
A hit-miss model for duplicate detection in the WHO drug safety database
The WHO Collaborating Centre for International Drug Monitoring in Uppsala, Sweden, maintains and analyses the world's largest database of reports on suspected adverse drug re...
Andrew Bate, G. Niklas Norén, Roland Orre
FDBS
2001
92views more  FDBS 2001»
13 years 8 months ago
Integrating Data and Probabilistically Structured Text Documents
Commercial, non-profit and public organizations are accumulating huge amounts of electronically available text documents. Although composed of unstructured texts, documents contai...
Karsten Winkler, Myra Spiliopoulou