Sciweavers

171 search results - page 10 / 35
» Evaluating the limitations of and alternatives in beaconing
Sort
View
JAMIA
2011
140views more  JAMIA 2011»
14 years 2 months ago
Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule
Objective Healthcare organizations must de-identify patient records before sharing data. Many organizations rely on the Safe Harbor Standard of the HIPAAPrivacy Rule, which enumer...
Bradley Malin, Kathleen Benitez, Daniel R. Masys
CN
2006
75views more  CN 2006»
14 years 11 months ago
Dynamic online QoS routing schemes: Performance and bounds
Several dynamic QoS routing techniques have been recently proposed for new IP networks based on label forwarding. However, no extensive performance evaluation and comparison is av...
Antonio Capone, Luigi Fratta, Fabio Martignon
ICML
2008
IEEE
16 years 17 days ago
A worst-case comparison between temporal difference and residual gradient with linear function approximation
Residual gradient (RG) was proposed as an alternative to TD(0) for policy evaluation when function approximation is used, but there exists little formal analysis comparing them ex...
Lihong Li
DCC
2008
IEEE
15 years 11 months ago
High-Resolution Functional Quantization
Suppose a function of N real source variables XN 1 = (X1, X2, . . . , XN ) is desired at a destination constrained to receive a limited number of bits. If the result of evaluating...
Vinith Misra, Vivek K. Goyal, Lav R. Varshney
AINA
2007
IEEE
15 years 6 months ago
A Utility-Based Adaptivity Model for Mobile Applications
Mobile environments are characterized by resource fluctuations and limitations, and variations in user preferences. Therefore mobile applications need to be adaptive to retain us...
Mourad Alia, Viktor S. Wold Eide, Nearchos Paspall...