HL7 and DICOM based integration of radiology departments with healthcare enterprise information systems Fulltext Access 8 Pages 2007
Non-invasive lightweight integration engine for building EHR from autonomous distributed systems Fulltext Access 8 Pages 2007
Evaluation of general practitioner's time investment during a store-and-forward teledermatology consultation Fulltext Access 8 Pages 2007
Identification of transcrystalline microcracks observed in microscope images of a dolomite structure using image analysis methods based on linear structuring element processing Fulltext Access 8 Pages 2007
Clustering of volcanic ash arising from different fragmentation mechanisms using Kohonen self-organizing maps Fulltext Access 8 Pages 2007
RockSee: Video image measurements of physical features to aid in highway rock cut characterization Fulltext Access 8 Pages 2007
Automating regional descriptive statistic computations for environmental modeling Fulltext Access 8 Pages 2007
INV2P5DSB—A code for gravity inversion of 2.5-D sedimentary basins using depth dependent density Fulltext Access 8 Pages 2007
Efficiency study of the information flow mechanism enabling interworking of heterogeneous wireless systems Fulltext Access 8 Pages 2007
Common defects in information security management system of Korean companies Fulltext Access 8 Pages 2007
Verification of instrumentation techniques for resource management of real-time systems Fulltext Access 8 Pages 2007
Feedback control-based dynamic resource management in distributed real-time systems Fulltext Access 8 Pages 2007
Reflections on 10 years of sponsored senior design projects: Students win–clients win! Fulltext Access 8 Pages 2007
Inconsistency of expert judgment-based estimates of software development effort Fulltext Access 8 Pages 2007
General evolutionary theory of information production processes and applications to the evolution of networks Fulltext Access 8 Pages 2007
A generic concept for the implementation of medical image retrieval systems Fulltext Access 8 Pages 2007
Defining and relating biomedical terms: Towards a cross-language morphosemantics-based system Fulltext Access 8 Pages 2007
Building an ontology of pulmonary diseases with natural language processing tools using textual corpora Fulltext Access 8 Pages 2007
The use of a registry database in clinical trial design: Assessing the influence of entry criteria on statistical power and number of eligible patients Fulltext Access 8 Pages 2007
A data-gathering broker as a future-orientated approach to supporting EPR users Fulltext Access 8 Pages 2007
An integrated approach to distance learning with digital video in the French-speaking Virtual Medical University Fulltext Access 8 Pages 2007
Training inter-physician communication using the Dynamic Patient Simulator® Fulltext Access 8 Pages 2007
Predictors of urinary tract infection based on artificial neural networks and genetic algorithms Fulltext Access 8 Pages 2007
The roles of policy and professionalism in the protection of processed clinical data: A literature review Fulltext Access 8 Pages 2007
Identifying asthma exacerbations in a pediatric emergency department: A feasibility study Fulltext Access 8 Pages 2007
Automatic detecting indicators for quality of health information on the Web Fulltext Access 8 Pages 2007
The impact of the implementation of a rehabilitation tool on the contents of the communication during multidisciplinary team conferences in rheumatology Fulltext Access 8 Pages 2007
A qualitative study of the implementation of a bioinformatics tool in a biological research laboratory Fulltext Access 8 Pages 2007
Context, automated decision support, and clinical practice guidelines: Does the literature apply to the United States practice environment? Fulltext Access 8 Pages 2007
A structured hierarchical P2P model based on a rigorous binary tree code algorithm Fulltext Access 8 Pages 2007
Intrusion detection using text processing techniques with a kernel based similarity measure Fulltext Access 8 Pages 2007
Authentication in a layered security approach for mobile ad hoc networks Fulltext Access 8 Pages 2007
Value-focused assessment of ICT security awareness in an academic environment Fulltext Access 8 Pages 2007
Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection Fulltext Access 8 Pages 2007
Distributed data mining on Agent Grid: Issues, platform and development toolkit Fulltext Access 8 Pages 2007
The role of Wireless Sensor Networks in the area of Critical Information Infrastructure Protection Fulltext Access 8 Pages 2007
Modelling decision support and uncertainty for large transport infrastructure projects: The CLG-DSS model of the Øresund Fixed Link Fulltext Access 9 Pages 2007
Generalization of strategies for fuzzy query translation in classical relational databases Fulltext Access 9 Pages 2007
Web-enabled strategic GDSS, e-democracy and Arrow's theorem: A Bayesian perspective Fulltext Access 9 Pages 2007
The value of IT to firms in a developing country in the catch-up process: An empirical comparison of China and the United States Fulltext Access 9 Pages 2007
An efficient, robust method for processing of partial top-k/bottom-k queries using the RD-Tree in OLAP Fulltext Access 9 Pages 2007
Rethinking ERP success: A new perspective from knowledge management and continuous improvement Fulltext Access 9 Pages 2007
Subjective tests for image fusion evaluation and objective metric validation Fulltext Access 9 Pages 2007
Determinants of e-repurchase intentions: An integrative model of quadruple retention drivers Fulltext Access 9 Pages 2007
A study on decision consolidation methods using analytic models for security systems Fulltext Access 9 Pages 2007
Comparative studies on authentication and key exchange methods for 802.11 wireless LAN Fulltext Access 9 Pages 2007
An active learning based TCM-KNN algorithm for supervised network intrusion detection Fulltext Access 9 Pages 2007
Evaluating information security tradeoffs: Restricting access can interfere with user tasks Fulltext Access 9 Pages 2007
Biologically-inspired Complex Adaptive Systems approaches to Network Intrusion Detection Fulltext Access 9 Pages 2007
Massive threading: Using GPUs to increase the performance of digital forensics tools Fulltext Access 9 Pages 2007