Sciweavers

1398 search results - page 198 / 280
» Medical Database Security
Sort
View
75
Voted
ECIS
2004
15 years 2 months ago
Evaluating integration approaches benefits adopted by healthcare organisations
Healthcare organizations consist of a large number of disparate information systems (IS). These have been deployed to support specific needs of healthcare organisations. The infor...
Khalil Khoumbati, Marinos Themistocleous, Zahir Ir...
118
Voted
DRR
2008
15 years 1 months ago
Interactive degraded document enhancement and ground truth generation
Degraded documents are frequently obtained in various situations. Examples of degraded document collections include historical document depositories, document obtained in legal an...
G. Bal, Gady Agam, Ophir Frieder, Gideon Frieder
122
Voted
GRID
2006
Springer
15 years 18 days ago
Snapshot Processing in Streaming Environments
Monitoring and correlation of streaming data from multiple sources is becoming increasingly important in many application areas. Example applications include automated commodities...
Daniel M. Zimmerman, K. Mani Chandy
90
Voted
ICRA
2010
IEEE
154views Robotics» more  ICRA 2010»
14 years 11 months ago
Design and analysis of a soft mobile robot composed of multiple thermally activated joints driven by a single actuator
— Soft robotic systems have applications in industrial, medical, and security applications. Many applications require these robots to be small and lightweight. One challenge in d...
Nadia Cheng, Genya Ishigami, Stephan Hawthorne, Ha...
110
Voted
KDD
2003
ACM
161views Data Mining» more  KDD 2003»
16 years 1 months ago
Empirical Bayesian data mining for discovering patterns in post-marketing drug safety
Because of practical limits in characterizing the safety profiles of therapeutic products prior to marketing, manufacturers and regulatory agencies perform post-marketing surveill...
David M. Fram, June S. Almenoff, William DuMouchel