Sciweavers

6696 search results - page 1282 / 1340
» Securing social networks
Sort
View
JAMIA
2011
83views more  JAMIA 2011»
12 years 11 months ago
Use of electronic clinical documentation: time spent and team interactions
Objective To measure the time spent authoring and viewing documentation and to study patterns of usage in healthcare practice. Design Audit logs for an electronic health record we...
George Hripcsak, David K. Vawdrey, Matthew R. Fred...
JOCN
2011
115views more  JOCN 2011»
12 years 11 months ago
Differential Involvement of Somatosensory and Interoceptive Cortices during the Observation of Affective Touch
■ Previous studies suggested that the observation of other individualsʼ somatosensory experiences also activates brain circuits processing oneʼs own somatosensory experiences....
Sjoerd J. H. Ebisch, Francesca Ferri, Anatolia Sal...
PERVASIVE
2011
Springer
12 years 11 months ago
NextPlace: A Spatio-temporal Prediction Framework for Pervasive Systems
Abstract. Accurate and fine-grained prediction of future user location and geographical profile has interesting and promising applications including targeted content service, adv...
Salvatore Scellato, Mirco Musolesi, Cecilia Mascol...
WSDM
2012
ACM
290views Data Mining» more  WSDM 2012»
12 years 4 months ago
Online selection of diverse results
The phenomenal growth in the volume of easily accessible information via various web-based services has made it essential for service providers to provide users with personalized ...
Debmalya Panigrahi, Atish Das Sarma, Gagan Aggarwa...
KDD
2012
ACM
271views Data Mining» more  KDD 2012»
11 years 11 months ago
GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries
Many data are modeled as tensors, or multi dimensional arrays. Examples include the predicates (subject, verb, object) in knowledge bases, hyperlinks and anchor texts in the Web g...
U. Kang, Evangelos E. Papalexakis, Abhay Harpale, ...
« Prev « First page 1282 / 1340 Last » Next »