Sciweavers

1534 search results - page 259 / 307
» networks 2011
Sort
View
CODASPY
2011
14 years 2 months ago
Privacy-preserving activity scheduling on mobile devices
—Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users’ personal schedules. Users also access popular contextbase...
Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hu...
JAMIA
2011
140views more  JAMIA 2011»
14 years 1 months ago
Never too old for anonymity: a statistical standard for demographic data sharing via the HIPAA Privacy Rule
Objective Healthcare organizations must de-identify patient records before sharing data. Many organizations rely on the Safe Harbor Standard of the HIPAAPrivacy Rule, which enumer...
Bradley Malin, Kathleen Benitez, Daniel R. Masys
JAMIA
2011
83views more  JAMIA 2011»
14 years 1 months ago
Use of electronic clinical documentation: time spent and team interactions
Objective To measure the time spent authoring and viewing documentation and to study patterns of usage in healthcare practice. Design Audit logs for an electronic health record we...
George Hripcsak, David K. Vawdrey, Matthew R. Fred...
JCAL
2011
89views more  JCAL 2011»
14 years 1 months ago
What if undergraduate students designed their own web learning environment? Exploring students' web 2.0 mentality through partic
Following the increasing calls for a more skeptical analysis of web 2.0 and the empowerment of learners’ voices in formulating upcoming technologies, this paper elaborates on the...
George Palaigeorgiou, George Triantafyllakos, Avgo...
JOCN
2011
133views more  JOCN 2011»
14 years 1 months ago
A Candidate for the Attentional Bottleneck: Set-size Specific Modulation of the Right TPJ during Attentive Enumeration
■ Several recent behavioral studies have shown that the enumeration of a small number of items (a process termed subitizing) depends on the availability of attentional resources...
Petra Vetter, Brian Butterworth, Bahador Bahrami