1 - 25 of 3
Number of results to display per page
CreatorTitleDescriptionSubjectDate
1 DuVall, Scott L.Identifying data set specific duplicate patient recordsProbabilistic models are commonly used in the identification of duplicate records. These methods are usually more accurate than deterministic methods, but are exponentially more computationally complex. Thus to make them computationally feasible, they rely on deterministic blocking strategies. Th...Probabilistic models; Duplicate records; Duplicate patient records; Trapeze Interactive Poster2009
2 Kasera, Sneha K.; Patwari, NealMobility Assisted Secret Key GenerationSignature Based Key Generation. Wireless link signature; multiple paths caused by radio waves; their measurements are good signatures of links; link signatures measured almost symmetrically at two ends of wireless link, but cannot be measured from another location; use for secret key establishment;...
3 Sanderson, Allen ReedVisualization and analysis tools for assisting in evaluating fusion simulations2012
1 - 25 of 3