Sciweavers

1085 search results - page 103 / 217
» Active Mining in a Distributed Setting
Sort
View
87
Voted
HCI
2007
15 years 2 months ago
Interfacing Safety and Communication Breakdowns: Situated Medical Technology Design
Safety-critical medical work requires an error-minded approach for design of the technologies that support its processes. We define the requirements that such a framework should me...
Svetlena Taneva, Effie Law
IDA
2007
Springer
15 years 15 days ago
WWW traffic measure and its properties
Abstract. We present a method to extract a time series (Number of Active Requests (NAR)) from web cache logs which serves as a transport level measurement of internet traffic. This...
Marcus R. Keogh-Brown, Barbara Bogacka
467
Voted

Presentation
945views
13 years 6 months ago
A Decentralized Method for Maximizing k-coverage Lifetime in WSNs
In this paper, we propose a decentralized method for maximizing lifetime of data collection wireless sensor networks (WSNs) by making minimal number of nodes operate and putting ot...
114
Voted
SDM
2010
SIAM
218views Data Mining» more  SDM 2010»
15 years 2 months ago
Confidence-Based Feature Acquisition to Minimize Training and Test Costs
We present Confidence-based Feature Acquisition (CFA), a novel supervised learning method for acquiring missing feature values when there is missing data at both training and test...
Marie desJardins, James MacGlashan, Kiri L. Wagsta...
IJMI
2007
140views more  IJMI 2007»
15 years 14 days ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson