Search
Search Results
-
A. Proof of Thm. 4.34
Abstract not available -
Index
Abstract not available -
-
-
Current Status of Computerized Decision Support Systems in Mammography
Breast cancer is one of the most devastating and deadly diseases for women today. Despite advances in cancer treatment, early mammographic detection... -
Analysis and Architecture of Clinical Workflow Systems using Agent-Oriented Lifecycle Models
Healthcare executives are grappling with a climate of great change in the healthcare industry. This is coming from a number of sources. First, there... -
Computerization of Clinical Guidelines: an Application of Medical Document Processing
Clinical Guidelines are being developed as a tool to promote Best Practice in Medicine. They are usually defined as “systematically developed... -
Case-based Medical Informatics
The “applied” nature distinguishes applied sciences from theoretical sciences. To emphasize this distinction, we begin with a general, meta-level... -
Medical Diagnosis and Prognosis Based on the DNA Microarray Technology
Immense genomic data have been accumulated through various research activities such as the Human Genome Project. A genome is the entire collection of... -
Wearable Devices in Healthcare
The miniaturization of electrical and electronic equipment is certainly not a new phenomenon, and its effects have long been evident in the... -
-
References
Abstract not available -
-
Evidence Based Telemedicine
This chapter focuses on evidence based telemedicine and its various applications. Evidence based medicine is the integration of best research... -
Virtual Communities in Health Care
A virtual community is a social entity involving several individuals who relate to one another by the use of a specific communication technology that... -
-
-
-
A method for visualizing urban road events using distributed acoustic sensing
This study presents the construction of an urban underground sensing system using distributed acoustic sensing (DAS) technology, which utilizes the...
-
An empirical study of reflection attacks using NetFlow data
Reflection attacks are one of the most intimidating threats organizations face. A reflection attack is a special type of distributed...