Sciweavers

2492 search results - page 426 / 499
» False-Name-Proofness in Social Networks
Sort
View
ANOR
2010
97views more  ANOR 2010»
14 years 11 months ago
Quality competition for screening and treatment services
This paper examines how quality for one type of preventive health care services, screening services are determined under competition and explores its links with the treatment servi...
Evrim D. Günes, Stephen E. Chick, Luk N. Van ...
TCSV
2010
14 years 8 months ago
Cooperative Peer-to-Peer Streaming: An Evolutionary Game-Theoretic Approach
While peer-to-peer (P2P) video streaming systems have achieved promising results, they introduce a large number of unnecessary traverse links, which consequently leads to substanti...
Yan Chen, Beibei Wang, W. Sabrina Lin, Yongle Wu, ...
CORR
2011
Springer
199views Education» more  CORR 2011»
14 years 5 months ago
Surrogate Parenthood: Protected and Informative Graphs
Many applications, including provenance and some analyses of social networks, require path-based queries over graphstructured data. When these graphs contain sensitive information...
Barbara T. Blaustein, Adriane Chapman, Len Seligma...
CODASPY
2011
14 years 5 months ago
Privacy-preserving activity scheduling on mobile devices
—Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users’ personal schedules. Users also access popular contextbase...
Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hu...
JAMIA
2011
83views more  JAMIA 2011»
14 years 4 months ago
Use of electronic clinical documentation: time spent and team interactions
Objective To measure the time spent authoring and viewing documentation and to study patterns of usage in healthcare practice. Design Audit logs for an electronic health record we...
George Hripcsak, David K. Vawdrey, Matthew R. Fred...