Sciweavers

3689 search results - page 568 / 738
» The Branding Analysis Pattern
Sort
View
JAMIA
2011
83views more  JAMIA 2011»
14 years 7 months ago
Use of electronic clinical documentation: time spent and team interactions
Objective To measure the time spent authoring and viewing documentation and to study patterns of usage in healthcare practice. Design Audit logs for an electronic health record we...
George Hripcsak, David K. Vawdrey, Matthew R. Fred...
CCS
2011
ACM
14 years 4 months ago
MIDeA: a multi-parallel intrusion detection architecture
Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Giga...
Giorgos Vasiliadis, Michalis Polychronakis, Sotiri...
177
Voted
CIKM
2011
Springer
14 years 4 months ago
LogSig: generating system events from raw textual logs
Modern computing systems generate large amounts of log data. System administrators or domain experts utilize the log data to understand and optimize system behaviors. Most system ...
Liang Tang, Tao Li, Chang-Shing Perng

Lab
1627views
17 years 5 months ago
CVIP Lab
The Computer Vision and Image Processing Laboratory (CVIP Lab) was established in 1994 at the University of Louisville and is committed to excellence in research, teaching and trai...
CVPR
2001
IEEE
16 years 6 months ago
Learning Probabilistic Distribution Model for Multi-View Face Detection
Modeling subspaces of a distribution of interest in high dimensional spaces is a challenging problem in pattern analysis. In this paper, we present a novel framework for pose inva...
Lie Gu, Stan Z. Li, HongJiang Zhang