We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Analysis and Architecture of Clinical Workflow Systems using Agent-Oriented Lifecycle Models

    Healthcare executives are grappling with a climate of great change in the healthcare industry. This is coming from a number of sources. First, there...
    James P. Davis, Raphael Blanco in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  2. Current Status of Computerized Decision Support Systems in Mammography

    Breast cancer is one of the most devastating and deadly diseases for women today. Despite advances in cancer treatment, early mammographic detection...
    Chapter
  3. Case-based Medical Informatics

    The “applied” nature distinguishes applied sciences from theoretical sciences. To emphasize this distinction, we begin with a general, meta-level...
    Stefan V. Pantazi, José F. Arocha, Jochen R. Moehr in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  4. Medical Diagnosis and Prognosis Based on the DNA Microarray Technology

    Immense genomic data have been accumulated through various research activities such as the Human Genome Project. A genome is the entire collection of...
    Y. Fukuoka, H. Inaoka, I. S. Kohane in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  5. Computerization of Clinical Guidelines: an Application of Medical Document Processing

    Clinical Guidelines are being developed as a tool to promote Best Practice in Medicine. They are usually defined as “systematically developed...
    Chapter
  6. Wearable Devices in Healthcare

    The miniaturization of electrical and electronic equipment is certainly not a new phenomenon, and its effects have long been evident in the...
    Constantine Glaros, Dimitrios I. Fotiadis in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  7. Evidence Based Telemedicine

    This chapter focuses on evidence based telemedicine and its various applications. Evidence based medicine is the integration of best research...
    George Anogianakis, Anelia Klisarova, ... Antonia Anogeianaki in Intelligent Paradigms for Healthcare Enterprises
    Chapter
  8. Virtual Communities in Health Care

    A virtual community is a social entity involving several individuals who relate to one another by the use of a specific communication technology that...
    Chapter
  9. From Databases to Exchange Formats

    This chapter addresses the question of how to transform relational database content into exchange formats in order to enable data interoperability...
    Stefanie Rinderle-Ma, Jürgen Mangler, Daniel Ritter in Fundamentals of Information Systems Interoperability
    Chapter 2024
  10. Process Orchestration: Conceptual Design

    This chapter explains and discusses concepts for the conceptual design and formal verification of process orchestrations, employing notations such as...
    Stefanie Rinderle-Ma, Jürgen Mangler, Daniel Ritter in Fundamentals of Information Systems Interoperability
    Chapter 2024
  11. Complexity-Approximation Trade-Offs in Exchange Mechanisms: AMMs vs. LOBs

    This paper presents a general framework for the design and analysis of exchange mechanisms between two assets that unifies and enables comparisons...
    Jason Milionis, Ciamac C. Moallemi, Tim Roughgarden in Financial Cryptography and Data Security
    Conference paper 2024
  12. Bayesian Network-Based Multi-objective Estimation of Distribution Algorithm for Feature Selection Tailored to Regression Problems

    Feature selection is an essential pre-processing step in Machine Learning for improving the performance of models, reducing the time of predictions,...
    José A. López, Felipe Morales-Osorio, ... Claudia N. Sánchez in Advances in Computational Intelligence
    Conference paper 2024
  13. Eagle: Efficient Privacy Preserving Smart Contracts

    The proliferation of Decentralised Finance (DeFi) and Decentralised Autonomous Organisations (DAO), which in current form are exposed to...
    Carsten Baum, James Hsin-yu Chiang, ... Tore Kasper Frederiksen in Financial Cryptography and Data Security
    Conference paper 2024
  14. Applying Genetic Algorithms to Validate a Conjecture in Graph Theory: The Minimum Dominating Set Problem

    This paper presents a case study where the interdisciplinary approach between artificial intelligence, specifically genetic algorithms, and discrete...
    Jorge Cervantes-Ojeda, María C. Gómez-Fuentes, Julian A. Fresán-Figueroa in Advances in Computational Intelligence
    Conference paper 2024
  15. Multiresolution Controller Based on Window Function Networks for a Quanser Helicopter

    To improve neural network (NN) performance, new activation functions, such as ReLU, GELU, and SELU, to name a few, have been proposed. Windows-based...
    Oscar Federico Garcia-Castro, Luis Enrique Ramos-Velasco, ... Enrique Escamilla-Hernández in Advances in Computational Intelligence
    Conference paper 2024
  16. Provably Avoiding Geographic Regions for Tor’s Onion Services

    Tor, a peer-to-peer anonymous communication system, is one of the most effective tools in providing free and open communication online. Many of the...
    Arushi Arora, Raj Karra, ... Christina Garman in Financial Cryptography and Data Security
    Conference paper 2024
  17. Smart Noise Detection for Statistical Disclosure Attacks

    While anonymization systems like mix networks can provide privacy to their users by, e.g., hiding their communication relationships, several traffic...
    Marc Roßberger, Doğan Kesdoğan in Secure IT Systems
    Conference paper 2024
  18. Load Demand Forecasting Using a Long-Short Term Memory Neural Network

    Electric power load forecasting is very important for the operation and the planning of a utility company. Decisions of the electric market, electric...
    Arturo Ortega, Monica Borunda, ... Carlos Garcia-Beltran in Advances in Computational Intelligence
    Conference paper 2024
  19. Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees

    Secure message transmission (SMT) constitutes a fundamental network-layer building block for distributed protocols over incomplete networks. More...
    Giovanni Deligios, Chen-Da Liu-Zhang in Financial Cryptography and Data Security
    Conference paper 2024
Did you find what you were looking for? Share feedback.