Sciweavers

20778 search results - page 3915 / 4156
» Algorithms for Data Migration
Sort
View
IHI
2010
197views Healthcare» more  IHI 2010»
14 years 11 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
ITIIS
2010
129views more  ITIIS 2010»
14 years 11 months ago
Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping
Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by fi...
Dongkyoo Shin, Dongil Shin, Jaewan Shin, Soohan Ki...
149
Voted
JMLR
2010
206views more  JMLR 2010»
14 years 11 months ago
Learning Translation Invariant Kernels for Classification
Appropriate selection of the kernel function, which implicitly defines the feature space of an algorithm, has a crucial role in the success of kernel methods. In this paper, we co...
Sayed Kamaledin Ghiasi Shirazi, Reza Safabakhsh, M...
SIAMSC
2010
132views more  SIAMSC 2010»
14 years 11 months ago
Some Improvements for the Fast Sweeping Method
In this paper, we outline two improvements to the fast sweeping method to improve the speed of the method in general and more specifically in cases where the speed is changing rapi...
Stanley Bak, Joyce R. McLaughlin, Daniel Renzi
VCBM
2010
14 years 10 months ago
Adapted Surface Visualization of Cerebral Aneurysms with Embedded Blood Flow Information
Cerebral aneurysms are a vascular dilatation induced by a pathological change of the vessel wall and often require treatment to avoid rupture. Therefore, it is of main interest, t...
Rocco Gasteiger, Mathias Neugebauer, Christoph Kub...
« Prev « First page 3915 / 4156 Last » Next »