We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Analysis and Architecture of Clinical Workflow Systems using Agent-Oriented Lifecycle Models

    Healthcare executives are grappling with a climate of great change in the healthcare industry. This is coming from a number of sources. First, there...
    James P. Davis, Raphael Blanco in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  2. Current Status of Computerized Decision Support Systems in Mammography

    Breast cancer is one of the most devastating and deadly diseases for women today. Despite advances in cancer treatment, early mammographic detection...
    Chapter
  3. Case-based Medical Informatics

    The “applied” nature distinguishes applied sciences from theoretical sciences. To emphasize this distinction, we begin with a general, meta-level...
    Stefan V. Pantazi, José F. Arocha, Jochen R. Moehr in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  4. Medical Diagnosis and Prognosis Based on the DNA Microarray Technology

    Immense genomic data have been accumulated through various research activities such as the Human Genome Project. A genome is the entire collection of...
    Y. Fukuoka, H. Inaoka, I. S. Kohane in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  5. Computerization of Clinical Guidelines: an Application of Medical Document Processing

    Clinical Guidelines are being developed as a tool to promote Best Practice in Medicine. They are usually defined as “systematically developed...
    Chapter
  6. Wearable Devices in Healthcare

    The miniaturization of electrical and electronic equipment is certainly not a new phenomenon, and its effects have long been evident in the...
    Constantine Glaros, Dimitrios I. Fotiadis in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  7. Evidence Based Telemedicine

    This chapter focuses on evidence based telemedicine and its various applications. Evidence based medicine is the integration of best research...
    George Anogianakis, Anelia Klisarova, ... Antonia Anogeianaki in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  8. Virtual Communities in Health Care

    A virtual community is a social entity involving several individuals who relate to one another by the use of a specific communication technology that...
    Chapter
  9. Robotik: Definitionen

    Die für den Robotereinsatz in der Produktion wichtigsten Begriffe werden definiert. Darunter fällt die Abgrenzung von Industrierobotern,...
    Living reference work entry 2024
  10. Smell and Taste-Based Interactions Enabled Through Advances in Digital Technology

    Innovations around smell and taste interfaces are quickly emerging in the literature and practice, they include fully controllable sensory delivery...
    Patricia Cornelio, Chi Thanh Vi, ... Marianna Obrist in Handbook of Human Computer Interaction
    Living reference work entry 2024
  11. From Databases to Exchange Formats

    This chapter addresses the question of how to transform relational database content into exchange formats in order to enable data interoperability...
    Stefanie Rinderle-Ma, Jürgen Mangler, Daniel Ritter in Fundamentals of Information Systems Interoperability
    Chapter 2024
  12. Process Orchestration: Conceptual Design

    This chapter explains and discusses concepts for the conceptual design and formal verification of process orchestrations, employing notations such as...
    Stefanie Rinderle-Ma, Jürgen Mangler, Daniel Ritter in Fundamentals of Information Systems Interoperability
    Chapter 2024
  13. Complexity-Approximation Trade-Offs in Exchange Mechanisms: AMMs vs. LOBs

    This paper presents a general framework for the design and analysis of exchange mechanisms between two assets that unifies and enables comparisons...
    Jason Milionis, Ciamac C. Moallemi, Tim Roughgarden in Financial Cryptography and Data Security
    Conference paper 2024
  14. Bayesian Network-Based Multi-objective Estimation of Distribution Algorithm for Feature Selection Tailored to Regression Problems

    Feature selection is an essential pre-processing step in Machine Learning for improving the performance of models, reducing the time of predictions,...
    José A. López, Felipe Morales-Osorio, ... Claudia N. Sánchez in Advances in Computational Intelligence
    Conference paper 2024
  15. Eagle: Efficient Privacy Preserving Smart Contracts

    The proliferation of Decentralised Finance (DeFi) and Decentralised Autonomous Organisations (DAO), which in current form are exposed to...
    Carsten Baum, James Hsin-yu Chiang, ... Tore Kasper Frederiksen in Financial Cryptography and Data Security
    Conference paper 2024
  16. Applying Genetic Algorithms to Validate a Conjecture in Graph Theory: The Minimum Dominating Set Problem

    This paper presents a case study where the interdisciplinary approach between artificial intelligence, specifically genetic algorithms, and discrete...
    Jorge Cervantes-Ojeda, María C. Gómez-Fuentes, Julian A. Fresán-Figueroa in Advances in Computational Intelligence
    Conference paper 2024
  17. Multiresolution Controller Based on Window Function Networks for a Quanser Helicopter

    To improve neural network (NN) performance, new activation functions, such as ReLU, GELU, and SELU, to name a few, have been proposed. Windows-based...
    Oscar Federico Garcia-Castro, Luis Enrique Ramos-Velasco, ... Enrique Escamilla-Hernández in Advances in Computational Intelligence
    Conference paper 2024
  18. Provably Avoiding Geographic Regions for Tor’s Onion Services

    Tor, a peer-to-peer anonymous communication system, is one of the most effective tools in providing free and open communication online. Many of the...
    Arushi Arora, Raj Karra, ... Christina Garman in Financial Cryptography and Data Security
    Conference paper 2024
  19. Smart Noise Detection for Statistical Disclosure Attacks

    While anonymization systems like mix networks can provide privacy to their users by, e.g., hiding their communication relationships, several traffic...
    Marc Roßberger, Doğan Kesdoğan in Secure IT Systems
    Conference paper 2024
Did you find what you were looking for? Share feedback.