|
|
Creator | Title | Description | Subject | Date |
1 |
|
DuVall, Scott L. | Identifying data set specific duplicate patient records | Probabilistic models are commonly used in the identification of duplicate records. These methods are usually more accurate than deterministic methods, but are exponentially more computationally complex. Thus to make them computationally feasible, they rely on deterministic blocking strategies. Th... | Probabilistic models; Duplicate records; Duplicate patient records; Trapeze Interactive Poster | 2009 |
2 |
|
Kasera, Sneha K.; Patwari, Neal | Mobility Assisted Secret Key Generation | Signature Based Key Generation. Wireless link signature; multiple paths caused by radio waves; their measurements are good signatures of links; link signatures measured almost symmetrically at two ends of wireless link, but cannot be measured from another location; use for secret key establishment;... | | |
3 |
|
Sanderson, Allen Reed | Visualization and analysis tools for assisting in evaluating fusion simulations | | | 2012 |