-
1
-
-
84885402905
-
An overview of medical image registration methods
-
J. A. Maintz and M. A. Viergever, "An overview of medical image registration methods," UU-CS, no. 1998-22, 1998.
-
(1998)
UU-CS No. 1998-22
-
-
Maintz, J.A.1
Viergever, M.A.2
-
3
-
-
0034575445
-
Current methods in medical image segmentation
-
D. L. Pham, C. Xu, and J. L. Prince, "Current methods in medical image segmentation," Annual review of biomedical engineering, vol. 2, no. 1, pp. 315-337, 2000.
-
(2000)
Annual Review of Biomedical Engineering
, vol.2
, Issue.1
, pp. 315-337
-
-
Pham, D.L.1
Xu, C.2
Prince, J.L.3
-
4
-
-
0033640668
-
Medical image analysis: Progress over two decades and the challenges ahead
-
J. S. Duncan and N. Ayache, "Medical image analysis: progress over two decades and the challenges ahead," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 22, no. 1, pp. 85-106, 2000.
-
(2000)
Pattern Analysis and Machine Intelligence, IEEE Transactions on
, vol.22
, Issue.1
, pp. 85-106
-
-
Duncan, J.S.1
Ayache, N.2
-
5
-
-
0035103741
-
Medical image registration
-
D. L. Hill, P. G. Batchelor, M. Holden, and D. J. Hawkes, "Medical image registration," Physics in medicine and biology, vol. 46, no. 3, p. R1, 2001.
-
(2001)
Physics in Medicine and Biology
, vol.46
, Issue.3
-
-
Hill, D.L.1
Batchelor, P.G.2
Holden, M.3
Hawkes, D.J.4
-
7
-
-
0043029204
-
Technical description of RODS: A real-time public health surveillance system
-
F.-C. Tsui, J. U. Espino, V. M. Dato, P. H. Gesteland, J. Hutman, and M. M. Wagner, "Technical description of RODS: a real-time public health surveillance system," Journal of the American Medical Informatics Association, vol. 10, no. 5, pp. 399-408, 2003.
-
(2003)
Journal of the American Medical Informatics Association
, vol.10
, Issue.5
, pp. 399-408
-
-
Tsui, F.-C.1
Espino, J.U.2
Dato, V.M.3
Gesteland, P.H.4
Hutman, J.5
Wagner, M.M.6
-
8
-
-
84885402630
-
Do hospital staff interfere with computer system implementation?
-
Springer
-
A. F. Dowling Jr, "Do hospital staff interfere with computer system implementation?" in Use and impact of computers in clinical medicine. Springer, 1987, pp. 302-317.
-
(1987)
Use and Impact of Computers in Clinical Medicine
, pp. 302-317
-
-
Dowling Jr., A.F.1
-
9
-
-
45949095118
-
Initiation and evaluation of an admission, discharge, transfer (ADT) nursing program in a pediatric setting
-
M. Giangiulio, L. Aurilio, P. Baker, B. Brienza, E. Moss, and N. Twinem, "Initiation and evaluation of an admission, discharge, transfer (ADT) nursing program in a pediatric setting," Issues in Comprehensive Pediatric Nursing, vol. 31, no. 2, pp. 61-70, 2008.
-
(2008)
Issues in Comprehensive Pediatric Nursing
, vol.31
, Issue.2
, pp. 61-70
-
-
Giangiulio, M.1
Aurilio, L.2
Baker, P.3
Brienza, B.4
Moss, E.5
Twinem, N.6
-
11
-
-
29244445108
-
HL7 clinical document architecture, release 2
-
R. H. Dolin, L. Alschuler, S. Boyer, C. Beebe, F. M. Behlen, P. V. Biron, and A. S. Shvo, "HL7 clinical document architecture, release 2," Journal of the American Medical Informatics Association, vol. 13, no. 1, pp. 30-39, 2006.
-
(2006)
Journal of the American Medical Informatics Association
, vol.13
, Issue.1
, pp. 30-39
-
-
Dolin, R.H.1
Alschuler, L.2
Boyer, S.3
Beebe, C.4
Behlen, F.M.5
Biron, P.V.6
Shvo, A.S.7
-
12
-
-
84947235017
-
Kademlia: A peer-to-peer information system based on the XOR metric
-
P. Maymounkov and D. Mazieres, "Kademlia: A peer-to-peer information system based on the XOR metric," Peer-to-Peer Systems, pp. 53-65, 2002.
-
(2002)
Peer-to-Peer Systems
, pp. 53-65
-
-
Maymounkov, P.1
Mazieres, D.2
-
13
-
-
55149122075
-
Tempering Kademlia with a robust identity based system
-
L. M. Aiello, M. Milanesio, G. Ruffo, and R. Schifanella, "Tempering Kademlia with a robust identity based system," in Peer-to-Peer Computing, 2008. P2P'08. Eighth International Conference on. IEEE, 2008, pp. 30-39.
-
(2008)
Peer-to-Peer Computing, 2008. P2P'08. Eighth International Conference On. IEEE
, pp. 30-39
-
-
Aiello, L.M.1
Milanesio, M.2
Ruffo, G.3
Schifanella, R.4
-
14
-
-
48049100352
-
S/Kademlia: A practicable approach towards secure key-based routing
-
IEEE
-
I. Baumgart and S. Mies, "S/Kademlia: A practicable Approach Towards Secure Key-Based Routing," in Parallel and Distributed Systems, 2007 International Conference on, vol. 2. IEEE, 2007, pp. 1-8.
-
(2007)
Parallel and Distributed Systems, 2007 International Conference on
, vol.2
, pp. 1-8
-
-
Baumgart, I.1
Mies, S.2
-
18
-
-
84860417497
-
An asynchronous covert channel using spam
-
A. Castiglione, A. D. Santis, U. Fiore, and F. Palmieri, "An asynchronous covert channel using spam," Computers & Mathematics with Applications, vol. 63, no. 2, pp. 437-447, 2012. [Online]. Available: http://dx. doi. org/10. 1016/j. camwa. 2011. 07. 068
-
(2012)
Computers & Mathematics with Applications
, vol.63
, Issue.2
, pp. 437-447
-
-
Castiglione, A.1
Santis, A.D.2
Fiore, U.3
Palmieri, F.4
-
19
-
-
80052381715
-
E-mail-Based covert channels for asynchronous message steganography
-
A. Castiglione, A. De Santis, U. Fiore, and F. Palmieri, "E-mail-Based Covert Channels for Asynchronous Message Steganography," in Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2011 Fifth International Conference on, 2011, pp. 503-508. Online. Available: http://dx. doi. org/10. 1109/IMIS. 2011. 133
-
(2011)
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2011 Fifth International Conference on
, pp. 503-508
-
-
Castiglione, A.1
De Santis, A.2
Fiore, U.3
Palmieri, F.4
-
20
-
-
0030086382
-
Rolebased access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Rolebased access control models," Computer, vol. 29, no. 2, pp. 38-47, 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
21
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, "Proposed NIST standard for role-based access control," ACM Transactions on Information and System Security (TISSEC), vol. 4, no. 3, pp. 224-274, 2001.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
22
-
-
38049077460
-
Efficient provably-secure hierarchical key assignment schemes
-
A. D. Santis, A. L. Ferrara, and B. Masucci, "Efficient Provably-Secure Hierarchical Key Assignment Schemes," in MFCS, 2007, pp. 371-382.
-
(2007)
MFCS
, pp. 371-382
-
-
Santis, A.D.1
Ferrara, A.L.2
Masucci, B.3
-
23
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
New York, NY, USA: ACM
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proceedings of the 13th ACM conference on Computer and communications security, ser. CCS '06. New York, NY, USA: ACM, 2006, pp. 89-98. [Online]. Available: http://doi. acm. org/10. 1145/ 1180405. 1180418
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security, Ser. CCS '06
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
24
-
-
35048901123
-
Public key encryption with keyword search
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," in EUROCRYPT, 2004, pp. 506-522.
-
(2004)
EUROCRYPT
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
25
-
-
0033034511
-
Craniofacial trauma presenting at an adult accident and emergency department with an emphasis on soft tissue injuries
-
T. Ong and M. Dudley, "Craniofacial trauma presenting at an adult accident and emergency department with an emphasis on soft tissue injuries," Injury, vol. 30, no. 5, pp. 357-363, 1999.
-
(1999)
Injury
, vol.30
, Issue.5
, pp. 357-363
-
-
Ong, T.1
Dudley, M.2
-
26
-
-
0029133919
-
Craniomaxillofacial trauma in the elderly
-
M. J. Goldschmidt, C. L. Castiglione, L. A. Assael, and M. D. Litt, "Craniomaxillofacial trauma in the elderly," Journal of oral and maxillofacial surgery, vol. 53, no. 10, pp. 1145-1149, 1995.
-
(1995)
Journal of Oral and Maxillofacial Surgery
, vol.53
, Issue.10
, pp. 1145-1149
-
-
Goldschmidt, M.J.1
Castiglione, C.L.2
Assael, L.A.3
Litt, M.D.4
|