Sciweavers

2904 search results - page 579 / 581
» Valuing Design Repair
Sort
View
JAMIA
2011
140views more  JAMIA 2011»
12 years 12 months ago
Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule
Objective Healthcare organizations must de-identify patient records before sharing data. Many organizations rely on the Safe Harbor Standard of the HIPAAPrivacy Rule, which enumer...
Bradley Malin, Kathleen Benitez, Daniel R. Masys
JCC
2011
154views more  JCC 2011»
12 years 12 months ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...
AEOG
2011
143views more  AEOG 2011»
12 years 9 months ago
Analyzing the effects of scale and land use pattern metrics on land use database generalization indices
The generalization index system is one of the critical issues for computer-aided land use database generalization. This paper studies the scale and land use pattern effects on lan...
Yaolin Liu, Limin Jiao, Yanfang Liu
IACR
2011
104views more  IACR 2011»
12 years 8 months ago
Short Transitive Signatures for Directed Trees
A transitive signature scheme allows to sign a graph in such a way that, given the signatures of edges (a, b) and (b, c), it is possible to compute the signature for the edge (or ...
Philippe Camacho, Alejandro Hevia
ICDE
2012
IEEE
291views Database» more  ICDE 2012»
12 years 8 months ago
Efficiently Monitoring Top-k Pairs over Sliding Windows
Top-k pairs queries have received significant attention by the research community. k-closest pairs queries, k-furthest pairs queries and their variants are among the most well stu...
Zhitao Shen, Muhammad Aamir Cheema, Xuemin Lin, We...