Objective To measure the time spent authoring and viewing documentation and to study patterns of usage in healthcare practice. Design Audit logs for an electronic health record we...
George Hripcsak, David K. Vawdrey, Matthew R. Fred...
Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Giga...
Modern computing systems generate large amounts of log data. System administrators or domain experts utilize the log data to understand and optimize system behaviors. Most system ...
The Computer Vision and Image Processing Laboratory (CVIP Lab) was established in 1994 at the University of Louisville and is committed to excellence in research, teaching and trai...
Modeling subspaces of a distribution of interest in high dimensional spaces is a challenging problem in pattern analysis. In this paper, we present a novel framework for pose inva...