Sciweavers

24 search results - page 4 / 5
» Wireless Forensic Analysis Tools for Use in the Electronic E...
Sort
View
MIE
2008
177views Healthcare» more  MIE 2008»
13 years 7 months ago
Process Mining Techniques: an Application to Stroke Care
In a competitive health-care market, hospitals have to focus on ways to streamline their processes in order to deliver high quality care while at the same time reducing costs. To a...
Ronny Mans, Helen Schonenberg, Giorgio Leonardi, S...
TMC
2008
210views more  TMC 2008»
13 years 5 months ago
Adaptive Cluster-Based Data Collection in Sensor Networks with Direct Sink Access
Recently wireless sensor networks featuring direct sink access have been studied as an efficient architecture to gather and process data for numerous applications. In this paper, w...
Mahdi Lotfinezhad, Ben Liang, Elvino S. Sousa
COMCOM
2011
13 years 23 days ago
Reconstructing social interactions using an unreliable wireless sensor network
In the very active field of complex networks, research advances have largely been stimulated by the availability of empirical data and the increase in computational power needed ...
Adrien Friggeri, Guillaume Chelius, Eric Fleury, A...
DSS
2002
139views more  DSS 2002»
13 years 5 months ago
CI Spider: a tool for competitive intelligence on the Web
Competitive Intelligence (CI) aims to monitor a firm's external environment for information relevant to its decision-making process. As an excellent information source, the I...
Hsinchun Chen, Michael Chau, Daniel Dajun Zeng
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
13 years 9 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...