Sciweavers

1592 search results - page 248 / 319
» The state of the email address
Sort
View
IJIEM
2010
171views more  IJIEM 2010»
14 years 11 months ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
INFOCOM
2010
IEEE
14 years 11 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
ISVC
2010
Springer
14 years 11 months ago
Introducing Fuzzy Spatial Constraints in a Ranked Partitioned Sampling for Multi-object Tracking
Dealing with multi-object tracking in a particle filter raises several issues. A first essential point is to model possible interactions between objects. In this article, we repr...
Nicolas Widynski, Séverine Dubuisson, Isabe...
MIAR
2010
IEEE
14 years 11 months ago
Marker-Free Registration for Electromagnetic Navigation Bronchoscopy under Respiratory Motion
Abstract. Electromagnetic navigation bronchoscopy requires the accurate registration of a preinterventional computed tomography (CT) image to the coordinate system of the electroma...
Marco Feuerstein, Takamasa Sugiura, Daisuke Deguch...
PAMI
2010
113views more  PAMI 2010»
14 years 11 months ago
Hierarchical Bayesian Modeling of Topics in Time-Stamped Documents
—We consider the problem of inferring and modeling topics in a sequence of documents with known publication dates. The documents at a given time are each characterized by a topic...
Iulian Pruteanu-Malinici, Lu Ren, John William Pai...