Sciweavers

5344 search results - page 408 / 1069
» Privacy-Preserving Set Operations
Sort
View
MEDINFO
2007
132views Healthcare» more  MEDINFO 2007»
15 years 6 months ago
Comparing Decision Support Methodologies for Identifying Asthma Exacerbations
Objective: To apply and compare common machine learning techniques with an expert-built Bayesian Network to determine eligibility for asthma guidelines in pediatric emergency depa...
Judith W. Dexheimer, Laura E. Brown, Jeffrey Leego...
ICAI
2004
15 years 6 months ago
Using Fuzzy Clustering for Real-time Space Flight Safety
To ensure space flight safety, it is necessary to monitor myriad sensor readings on the ground and in flight. Since a space shuttle has many sensors, monitoring data and drawing c...
Charles Lee, Darrin M. Hanna, Richard E. Haskell, ...
ANLP
2000
140views more  ANLP 2000»
15 years 6 months ago
Sentence Reduction for Automatic Text Summarization
We present a novel sentence reduction system for automatically removing extraneous phrases from sentences that are extracted from a document for summarization purpose. The system ...
Hongyan Jing
BIRTHDAY
2010
Springer
15 years 6 months ago
Choiceless Computation and Symmetry
Many natural problems in computer science concern structures like graphs where elements are not inherently ordered. In contrast, Turing machines and other common models of computa...
Benjamin Rossman
FAST
2009
15 years 2 months ago
Provenance as Data Mining: Combining File System Metadata with Content Analysis
Provenance describes how an object came to be in its present state. Thus, it describes the evolution of the object over time. Prior work on provenance has focussed on databases an...
Vinay Deolalikar, Hernan Laffitte