Sciweavers

13414 search results - page 2674 / 2683
» The distributed boosting algorithm
Sort
View
JAMIA
2011
68views more  JAMIA 2011»
12 years 11 months ago
A secure protocol for protecting the identity of providers when disclosing data for disease surveillance
Background Providers have been reluctant to disclose patient data for public-health purposes. Even if patient privacy is ensured, the desire to protect provider confidentiality h...
Khaled El Emam, Jun Hu, Jay Mercer, Liam Peyton, M...
JCDL
2011
ACM
301views Education» more  JCDL 2011»
12 years 11 months ago
Archiving the web using page changes patterns: a case study
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of a data having generally some recurrent events. Patterns have received a considerab...
Myriam Ben Saad, Stéphane Gançarski
JCDL
2011
ACM
272views Education» more  JCDL 2011»
12 years 11 months ago
CollabSeer: a search engine for collaboration discovery
Collaborative research has been increasingly popular and important in academic circles. However, there is no open platform available for scholars or scientists to effectively dis...
Hung-Hsuan Chen, Liang Gou, Xiaolong Zhang, Clyde ...
MBEC
2011
117views more  MBEC 2011»
12 years 11 months ago
Face activated neurodynamic cortical networks
Previous neuroimaging studies have shown that complex visual stimuli, such as faces, activate multiple brain regions, yet little is known on the dynamics and complexity of the acti...
Ana Susac, Risto J. Ilmoniemi, Douglas Ranken, Sel...
PLDI
2011
ACM
12 years 11 months ago
Systematic editing: generating program transformations from an example
Software modifications are often systematic—they consist of similar, but not identical, program changes to multiple contexts. Existing tools for systematic program transformati...
Na Meng, Miryung Kim, Kathryn S. McKinley
« Prev « First page 2674 / 2683 Last » Next »