Sciweavers

501 search results - page 60 / 101
» date 2007
Sort
View
101
Voted
ACSW
2007
15 years 1 months ago
An Automated System for Conversion of Clinical Notes into SNOMED Clinical Terminology
The automatic conversion of free text into a medical ontology can allow computational access to important information currently locked within clinical notes and patient reports. T...
Jon Patrick, Yefeng Wang, Peter Budd
APPROX
2007
Springer
86views Algorithms» more  APPROX 2007»
15 years 4 months ago
Lower Bounds for Swapping Arthur and Merlin
We prove a lower bound for swapping the order of Arthur and Merlin in two-round MerlinArthur games using black-box techniques. Namely, we show that any AM-game requires time (t2 )...
Scott Diehl
119
Voted
ACSW
2007
15 years 1 months ago
The motivation and proposition of a privacy-enhancing architecture for operational databases
To date, research has focussed on privacy from a wide perspective, enabling organisations to implement various technologies that contribute to privacy protection. However, in such...
Kirsten Wahlstrom, Gerald Quirchmayr
ICISC
2007
102views Cryptology» more  ICISC 2007»
15 years 1 months ago
Passive Attacks on a Class of Authentication Protocols for RFID
Abstract. Mutual authentication mechanisms can be used in RFID systems to preserve the confidentiality of the RFID tags. Hiding the unique IDs of the tags is critical to prevent u...
Basel Alomair, Loukas Lazos, Radha Poovendran
93
Voted
ICONIP
2007
15 years 1 months ago
Policy Learning for Motor Skills
Policy learning which allows autonomous robots to adapt to novel situations has been a long standing vision of robotics, artificial intelligence, and cognitive sciences. However, ...
Jan Peters, Stefan Schaal