Sciweavers

1626 search results - page 294 / 326
» The method evaluation model: a theoretical model for validat...
Sort
View
INFOCOM
2005
IEEE
14 years 1 months ago
A beacon-less location discovery scheme for wireless sensor networks
— In wireless sensor networks (WSNs), sensor location plays a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number of l...
Lei Fang, Wenliang Du, Peng Ning
CICLING
2009
Springer
13 years 5 months ago
NLP for Shallow Question Answering of Legal Documents Using Graphs
Abstract. Previous work has shown that modeling relationships between articles of a regulation as vertices of a graph network works twice as better than traditional information ret...
Alfredo Monroy, Hiram Calvo, Alexander F. Gelbukh
JAMIA
2011
140views more  JAMIA 2011»
12 years 10 months ago
Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule
Objective Healthcare organizations must de-identify patient records before sharing data. Many organizations rely on the Safe Harbor Standard of the HIPAAPrivacy Rule, which enumer...
Bradley Malin, Kathleen Benitez, Daniel R. Masys
PRICAI
2000
Springer
13 years 11 months ago
Improved Efficiency of Oil Well Drilling through Case Based Reasoning
A system that applies a method of knowledge-intensive case-based reasoning, for repair and prevention of unwanted events in the domain of offshore oil well drilling, has been deve...
Pål Skalle, Jostein Sveen, Agnar Aamodt
CLEF
2010
Springer
13 years 9 months ago
Web Person Name Disambiguation by Relevance Weighting of Extended Feature Sets
Abstract. This paper describes our approach to the Person Name Disambiguation clustering task in the Third Web People Search Evaluation Campaign(WePS3). The method focuses on two a...
Chong Long, Lei Shi