-
1
-
-
34447117577
-
Dofetilide-Induced Long QT and Torsades de Pointes
-
PMID:17617063
-
Aktas, M., Shah, A. H., & Akiyama, T. (2007). Dofetilide-Induced Long QT and Torsades de Pointes. Annals of Noninvasive Electrocardiology, 12(3), 197-202. doi:10.1111/j.1542-474X.2007.00161.x PMID:17617063.
-
(2007)
Annals of Noninvasive Electrocardiology
, vol.12
, Issue.3
, pp. 197-202
-
-
Aktas, M.1
Shah, A.H.2
Akiyama, T.3
-
2
-
-
84881298398
-
-
(n.d.), Retrieved from
-
AliveCor. (n.d.). AliveCor Heart Monitor. Retrieved from http://www.alivecor.com.
-
AliveCor Heart Monitor
-
-
-
3
-
-
70349752533
-
-
(n.d.). Retrieved from
-
Amazon Web Services. (n.d.). Retrieved from http://aws.amazon.com.
-
Amazon Web Services
-
-
-
4
-
-
0031948978
-
The ISHNE Holter Standard Output File Format
-
Badilini, F. (1998). The ISHNE Holter Standard Output File Format. Annals of Noninvasive Cardiology, 263-266.
-
(1998)
Annals of Noninvasive Cardiology
, pp. 263-266
-
-
Badilini, F.1
-
5
-
-
0001421465
-
An analysis of the time-relations of electrocardiograms
-
Bazzett, H. (1997). An analysis of the time-relations of electrocardiograms. Annals of Noninvasive Electrocardiology, 2(2), 177-194. doi:10.1111/j.1542-474X.1997.tb00325.x.
-
(1997)
Annals of Noninvasive Electrocardiology
, vol.2
, Issue.2
, pp. 177-194
-
-
Bazzett, H.1
-
6
-
-
24144433396
-
Evaluating 2-DNF Formulas on Ciphertexts
-
Boneh, D., Goh, E.-J., & Nissim, K. (2005). Evaluating 2-DNF Formulas on Ciphertexts. Proceedings of the 2nd International Conference on Theory of Cryptography, (pp. 325-341). doi:10.1007/978-3-540-30576-7_18.
-
(2005)
Proceedings of the 2nd International Conference on Theory of Cryptography
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
7
-
-
84905174579
-
Private predictive analysis on encrypted medical data
-
PMID:24835616
-
Bos, J. W., Lauter, K., & Naehrig, M. (2014). Private predictive analysis on encrypted medical data. Journal of Biomedical Informatics, 50, 234-243. doi:10.1016/j.jbi.2014.04.003 PMID:24835616.
-
(2014)
Journal of Biomedical Informatics
, vol.50
, pp. 234-243
-
-
Bos, J.W.1
Lauter, K.2
Naehrig, M.3
-
8
-
-
84856466374
-
Leveled Fully Homomorphic Encryption without Bootstrapping
-
Brakerski, Z., Gentry, C., & Vaikuntanathan, V. (2012). Leveled Fully Homomorphic Encryption without Bootstrapping. Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, (pp. 309-325). doi:10.1145/2090236.2090262.
-
(2012)
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
, pp. 309-325
-
-
Brakerski, Z.1
Gentry, C.2
Vaikuntanathan, V.3
-
11
-
-
84865050453
-
Congenital long and short qt syndromes
-
PMID:22906875
-
Brenyo, A. J., Huang, D. T., & Aktas, M. (2011). Congenital long and short qt syndromes. Cardiology, 122(4), 237-247. doi:10.1159/000339537 PMID:22906875.
-
(2011)
Cardiology
, vol.122
, Issue.4
, pp. 237-247
-
-
Brenyo, A.J.1
Huang, D.T.2
Aktas, M.3
-
13
-
-
85032555931
-
-
CareCloud. (2013). Retrieved from http://www.carecloud.com/.
-
(2013)
-
-
-
14
-
-
0022188127
-
A robust and verifiable cryptographically secure election scheme
-
IEEE
-
Cohen, J. D., & Fischer, M. J. (1985). A robust and verifiable cryptographically secure election scheme. Symposium on Foundations of Computer Science (pp. 372-382). IEEE. doi:10.1109/SFCS.1985.2.
-
(1985)
Symposium on Foundations of Computer Science
, pp. 372-382
-
-
Cohen, J.D.1
Fischer, M.J.2
-
15
-
-
80051993169
-
-
CRYPTO
-
Coron, J.-S., Mandal, A., Naccache, D., & Tibouchi, M. (2011). Fully homomorphic encryption over the integers with shorter public keys (pp. 487-504). CRYPTO. doi:10.1007/978-3-642-22792-9_28.
-
(2011)
Fully homomorphic encryption over the integers with shorter public keys
, pp. 487-504
-
-
Coron, J.-S.1
Mandal, A.2
Naccache, D.3
Tibouchi, M.4
-
16
-
-
84859996823
-
Increased repolarization heterogeneity is associated with increased mortality in hemodialysis patients
-
Couderc, J., Xia, J., McGrath, M., Zareba, W., Slaton, B., & Kakulavaram, A. et al.. (2011). Increased repolarization heterogeneity is associated with increased mortality in hemodialysis patients. Computers in Cardiology, 845-848.
-
(2011)
Computers in Cardiology
, pp. 845-848
-
-
Couderc, J.1
Xia, J.2
McGrath, M.3
Zareba, W.4
Slaton, B.5
Kakulavaram, A.6
-
17
-
-
79953813438
-
Static and dynamic electrocardiographic patterns preceding torsades de pointes in the acquired and congenital long QT syndrome
-
PMID:22068668
-
Couderc, J., Xia, J., Xu, X., Kaab, S., Hinteeser, M., & Zareba, W. (2010). Static and dynamic electrocardiographic patterns preceding torsades de pointes in the acquired and congenital long QT syndrome. Computers in Cardiology, 357-360. PMID:22068668.
-
(2010)
Computers in Cardiology
, pp. 357-360
-
-
Couderc, J.1
Xia, J.2
Xu, X.3
Kaab, S.4
Hinteeser, M.5
Zareba, W.6
-
18
-
-
78650836659
-
The Telemetric and Holter ECG Warehouse initiative (THEW): A data repository for the design, implementation and validation of ECG related technologies
-
Couderc, J.-P. (2010). The Telemetric and Holter ECG Warehouse initiative (THEW): A data repository for the design, implementation and validation of ECG related technologies. IEEE Engineering in Medicine and Biology Society (EMBC), 6252-6255.
-
(2010)
IEEE Engineering in Medicine and Biology Society (EMBC)
, pp. 6252-6255
-
-
Couderc, J.-P.1
-
19
-
-
79251477866
-
Highly automated QT measurement techniques in 7 thorough QT studies implemented under ICH E14 guidelines
-
PMID:21251129
-
Couderc, J.-P., Garnett, C., Li, M., Handzel, R., McNitt, S., Xia, X., & Zareba, W. et al. (2011). Highly automated QT measurement techniques in 7 thorough QT studies implemented under ICH E14 guidelines. Annals of Noninvasive Electrocardiology, 16(1), 13-24. doi:10.1111/j.1542-474X.2010.00402.x PMID:21251129.
-
(2011)
Annals of Noninvasive Electrocardiology
, vol.16
, Issue.1
, pp. 13-24
-
-
Couderc, J.-P.1
Garnett, C.2
Li, M.3
Handzel, R.4
McNitt, S.5
Xia, X.6
Zareba, W.7
-
20
-
-
0001342967
-
Some schemes for parallel multipliers
-
Dadda, L. (1965). Some schemes for parallel multipliers. Alta Frequenza, 349-356.
-
(1965)
Alta Frequenza
, pp. 349-356
-
-
Dadda, L.1
-
23
-
-
85032555748
-
-
(n.d.). Retrieved from DARPA-PROCEED
-
DARPA-PROCEED. (n.d.). Retrieved from DARPA-PROCEED: http://www.darpa.mil/Our_Work/I2O/Programs/PROgramming_Computation_on_EncryptEd_Data_(PROCEED).aspx.
-
DARPA-PROCEED
-
-
-
24
-
-
77954642756
-
Fully Homomorphic Encryption over the Integers
-
Dijk, M., Gentry, C., Halevi, S., & Vaikuntanathan, V. (2010). Fully Homomorphic Encryption over the Integers. Advances in Cryptology (EUROCRYPT), 24-43.
-
(2010)
Advances in Cryptology (EUROCRYPT)
, pp. 24-43
-
-
Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
25
-
-
85032541634
-
-
Dr Chrono. (2013). Retrieved from https://drchrono.com.
-
(2013)
Dr Chrono
-
-
-
26
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms
-
El Gamal, T. (1985). A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE Transactions on Information Theory, 31(4), 469-472. doi:10.1109/TIT.1985.1057074.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
-
27
-
-
43049133294
-
Contributions of HERG K+ current to repolarization of the human ventricular action potential
-
PMID:17919688
-
Fink, M., Noble, D., Virag, L., Varro, A., & Giles, W. R. (2008). Contributions of HERG K+ current to repolarization of the human ventricular action potential. Progress in Biophysics and Molecular Biology, 96(1-3), 357-376. doi:10.1016/j.pbiomolbio.2007.07.011 PMID:17919688.
-
(2008)
Progress in Biophysics and Molecular Biology
, vol.96
, Issue.1-3
, pp. 357-376
-
-
Fink, M.1
Noble, D.2
Virag, L.3
Varro, A.4
Giles, W.R.5
-
31
-
-
84861702772
-
-
PKC
-
Gentry, C., Halevi, S., & Smart, N. (2012). Better bootstrapping in fully homomorphic encryption, (pp. 1-16). PKC.
-
(2012)
Better bootstrapping in fully homomorphic encryption
, pp. 1-16
-
-
Gentry, C.1
Halevi, S.2
Smart, N.3
-
32
-
-
84859991531
-
-
EUROCRYPT
-
Gentry, C., Halevi, S., & Smart, N. (2012). Fully homomorphic encryption with polylog overhead, (pp. 465-482). EUROCRYPT.
-
(2012)
Fully homomorphic encryption with polylog overhead
, pp. 465-482
-
-
Gentry, C.1
Halevi, S.2
Smart, N.3
-
33
-
-
84865518868
-
-
CRYPTO
-
Gentry, C., Halevi, S., & Smart, N. P. (2012). Homomorphic evaluation of the AES circuit, (pp. 850-867). CRYPTO.
-
(2012)
Homomorphic evaluation of the AES circuit
, pp. 850-867
-
-
Gentry, C.1
Halevi, S.2
Smart, N.P.3
-
35
-
-
84883261067
-
-
(n.d.). Retrieved from
-
Google Cloud Platform. (n.d.). Retrieved from https://cloud.google.com.
-
Google Cloud Platform
-
-
-
37
-
-
84871511126
-
Deaths: Preliminary data for 2011
-
PMID:24984457
-
Hoyert, D. L., & Xu, J. (2012). Deaths: Preliminary data for 2011. National Vital Statistics Reports, 61, 1-51. PMID:24984457.
-
(2012)
National Vital Statistics Reports
, vol.61
, pp. 1-51
-
-
Hoyert, D.L.1
Xu, J.2
-
39
-
-
84892542004
-
Assessment of Cloudbased Health Monitoring using Homomorphic Encryption
-
Asheville, NC, USA
-
Kocabas, O., Soyata, T., Couderc, J.-P., Aktas, M., Xia, J., & Huang, M. (2013). Assessment of Cloudbased Health Monitoring using Homomorphic Encryption. Proceedings of the 31th IEEE Conference on Computer Design, (pp. 443-446). Asheville, NC, USA. doi:10.1109/ICCD.2013.6657078.
-
(2013)
Proceedings of the 31th IEEE Conference on Computer Design
, pp. 443-446
-
-
Kocabas, O.1
Soyata, T.2
Couderc, J.-P.3
Aktas, M.4
Xia, J.5
Huang, M.6
-
40
-
-
0015651305
-
A parallel algorithm for the efficient solution of a general class of recurrence equations
-
Kogge, P. M., & Stone, H. S. (1973). A parallel algorithm for the efficient solution of a general class of recurrence equations. Transactions on Computers, 786-793.
-
(1973)
Transactions on Computers
, pp. 786-793
-
-
Kogge, P.M.1
Stone, H.S.2
-
41
-
-
84919799102
-
Use of Network Latency Profiling and Redundancy for Cloud Server Selection
-
Alaska
-
Kwon, M., Dou, Z., Heinzelman, W., Soyata, T., Ba, H., & Shi, J. (2014). Use of Network Latency Profiling and Redundancy for Cloud Server Selection. Proceedings of the 7th IEEE International Conference on Cloud Computing (IEEE CLOUD 2014), (pp. 826-832). Alaska. doi:10.1109/CLOUD.2014.114.
-
(2014)
Proceedings of the 7th IEEE International Conference on Cloud Computing (IEEE CLOUD 2014)
, pp. 826-832
-
-
Kwon, M.1
Dou, Z.2
Heinzelman, W.3
Soyata, T.4
Ba, H.5
Shi, J.6
-
42
-
-
84957986573
-
-
(n.d.). Retrieved from
-
Microsoft Windows Azure. (n.d.). Retrieved from http://www.microsoft.com/windowsazure.
-
-
-
-
46
-
-
84937054511
-
Cloud-based Secure Health Monitoring: Optimizing Fully-Homomorphic Encryption for Streaming Algorithms
-
Austin, TX
-
Page, A., Kocabas, O., Ames, S., Venkitasubramaniam, M., & Soyata, T. (2014). Cloud-based Secure Health Monitoring: Optimizing Fully-Homomorphic Encryption for Streaming Algorithms. IEEE Globecom 2014 Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA). Austin, TX.
-
(2014)
IEEE Globecom 2014 Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA)
-
-
Page, A.1
Kocabas, O.2
Ames, S.3
Venkitasubramaniam, M.4
Soyata, T.5
-
47
-
-
84937003217
-
Cloud-Based Privacy-Preserving Remote ECG Monitoring and Surveillance
-
n/a, PMID:25510621
-
Page, A., Kocabas, O., Soyata, T., Aktas, M., & Couderc, J.-P. (2014). Cloud-Based Privacy-Preserving Remote ECG Monitoring and Surveillance. Annals of Noninvasive Electrocardiology, n/a. doi:10.1111/ anec.12204 PMID:25510621.
-
(2014)
Annals of Noninvasive Electrocardiology
-
-
Page, A.1
Kocabas, O.2
Soyata, T.3
Aktas, M.4
Couderc, J.-P.5
-
49
-
-
84946688074
-
AXaaS: Case for Acceleration as a Service
-
Powers, N., Alling, A., Gyampoh-Vidogah, R., & Soyata, T. (2014). AXaaS: Case for Acceleration as a Service. IEEE Globecom 2014 Workshop on Cloud Computing Systems, Networks, and Applications.
-
(2014)
IEEE Globecom 2014 Workshop on Cloud Computing Systems, Networks, and Applications
-
-
Powers, N.1
Alling, A.2
Gyampoh-Vidogah, R.3
Soyata, T.4
-
50
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., Adleman, L., & Shamir, A. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126. doi:10.1145/359340.359342.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Adleman, L.2
Shamir, A.3
-
51
-
-
0005301490
-
On data banks and privacy homomorphisms
-
Rivest, R. L., Adleman, L., & Dertouzos, M. L. (1978). On data banks and privacy homomorphisms. Foundations of secure computation, 169-179.
-
(1978)
Foundations of secure computation
, pp. 169-179
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
53
-
-
83755175331
-
Guide to storage encryption technologies for end user devices
-
Scarfone, K., Souppaya, M., & Sexton, M. (2007). Guide to storage encryption technologies for end user devices. NIST Special Publication, 111.
-
(2007)
NIST Special Publication
, pp. 111
-
-
Scarfone, K.1
Souppaya, M.2
Sexton, M.3
-
54
-
-
2442667617
-
Drug-induced QT interval prolongation: Regulatory perspectives and drug development
-
PMID:15176424
-
Shah, R. (2004). Drug-induced QT interval prolongation: Regulatory perspectives and drug development. Annals of Medicine, 36(s1), 47-52. doi:10.1080/17431380410032445 PMID:15176424.
-
(2004)
Annals of Medicine
, vol.36
, pp. 47-52
-
-
Shah, R.1
-
55
-
-
23844542866
-
Drug-induced QT interval prolongation regulatory guidance and perspectives on hERG channel studies
-
Shah, R. R. (2005). Drug-induced QT interval prolongation regulatory guidance and perspectives on hERG channel studies. Novartis Foundation Symposium, (pp. 251-280). doi:10.1002/047002142X.ch19.
-
(2005)
Novartis Foundation Symposium
, pp. 251-280
-
-
Shah, R.R.1
-
57
-
-
84894656653
-
Fully homomorphic (SIMD) operations
-
Smart, N. P., & Vercauteren, F. (2014). Fully homomorphic (SIMD) operations. Designs, Codes and Cryptography, 71(1), 57-81. doi:10.1007/s10623-012-9720-4.
-
(2014)
Designs, Codes and Cryptography
, vol.71
, Issue.1
, pp. 57-81
-
-
Smart, N.P.1
Vercauteren, F.2
-
58
-
-
84945137823
-
Accelerating mobile cloud computing:A survey
-
IGI Global
-
Soyata, T., Ba, H., Heinzelman, W., Kwon, M., & Shi, J. (2013). Accelerating mobile cloud computing:A survey. In Communication Infrastructures for Cloud Computing, (pp. 175-197). IGI Global.
-
(2013)
Communication Infrastructures for Cloud Computing
, pp. 175-197
-
-
Soyata, T.1
Ba, H.2
Heinzelman, W.3
Kwon, M.4
Shi, J.5
-
59
-
-
84872569118
-
COMBAT:Mobile Cloud-based cOmpute/coMmunications infrastructure for BATtlefield applications. [Baltimore, MD.]
-
84030K-8403013
-
Soyata, T., Muraleedharan, R., Ames, S., Langdon, J., Funai, C., & Kwon, M. et al.. (2012). COMBAT:Mobile Cloud-based cOmpute/coMmunications infrastructure for BATtlefield applications. [Baltimore, MD.]. Proceedings of the Society for Photo-Instrumentation Engineers, 8403, 84030K-84030K, 84030K-13. doi:10.1117/12.919146.
-
(2012)
Proceedings of the Society for Photo-Instrumentation Engineers
, vol.8403
, pp. 84030K-84030K
-
-
Soyata, T.1
Muraleedharan, R.2
Ames, S.3
Langdon, J.4
Funai, C.5
Kwon, M.6
-
60
-
-
84866607503
-
(Cloud-Vision:) (Real-Time) Face Recognition Using a (Mobile-Cloudlet-Cloud) Acceleration Architecture
-
Cappadocia, Turkey
-
Soyata, T., Muraleedharan, R., Funai, C., Kwon, M., & Heinzelman, W. (2012). (Cloud-Vision:) (Real-Time) Face Recognition Using a (Mobile-Cloudlet-Cloud) Acceleration Architecture. Proceedings of the 17th IEEE Symposium on Computers and Communications (IEEE ISCC 2012), (pp. 59-66). Cappadocia, Turkey. doi:10.1109/ISCC.2012.6249269.
-
(2012)
Proceedings of the 17th IEEE Symposium on Computers and Communications (IEEE ISCC 2012)
, pp. 59-66
-
-
Soyata, T.1
Muraleedharan, R.2
Funai, C.3
Kwon, M.4
Heinzelman, W.5
-
62
-
-
84957986576
-
-
(n.d.), Retrieved from
-
University of Rochester. CIRC. (n.d.). Bluehive Cluster. Retrieved from http://www.circ.rochester.edu/ wiki/ index.php/BlueHiveCluster.
-
Bluehive Cluster
-
-
-
63
-
-
84957986577
-
-
Retrieved from HIPAA
-
US Department of Health and Human Services. (2014). Retrieved from HIPAA: http://www.hhs.gov/ ocr/privacy/.
-
(2014)
-
-
-
64
-
-
84870676636
-
-
(n.d.), Retrieved from
-
US Government Printing Office. (n.d.). Patient Protection and Affordable Care Act. Retrieved from http://www.gpo.gov/fdsys/pkg/BILLS-111hr3590enr/pdf/BILLS-111hr3590enr.pdf.
-
Patient Protection and Affordable Care Act
-
-
-
65
-
-
84957938008
-
-
(n.d.), Retrieved from
-
US-HHS. (n.d.). Business Associate Agreement. Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/ understanding/coveredentities/contractprov.html.
-
Business Associate Agreement
-
-
-
67
-
-
84926622431
-
Accessing Big Data in the Cloud Using Mobile Devices
-
P. R. Dek (Ed.), Hershey, PA, USA: IGI Global
-
Wang, H., Liu, W., & Soyata, T. (2014). Accessing Big Data in the Cloud Using Mobile Devices. In P. R. Dek (Ed.), Handbook of Research on Cloud Infrastructures for Big Data Analytics (pp. 444-470). Hershey, PA, USA: IGI Global. doi:10.4018/978-1-4666-5864-6.ch018.
-
(2014)
Handbook of Research on Cloud Infrastructures for Big Data Analytics
, pp. 444-470
-
-
Wang, H.1
Liu, W.2
Soyata, T.3
-
68
-
-
85032515153
-
-
Transactions on Computers
-
Wang, W., Hu, Y., Chen, L., Huang, X., & Sunar, B. (2013). Exploring the feasibility of fully homomorphic encryption. Transactions on Computers.
-
(2013)
Exploring the feasibility of fully homomorphic encryption
-
-
Wang, W.1
Hu, Y.2
Chen, L.3
Huang, X.4
Sunar, B.5
-
70
-
-
0028786001
-
Risk of cardiac events in family members of patients with long QT syndrome
-
PMID:7594104
-
Zareba, W., Moss, A. J., le Cessie, S., Locati, E. H., Robinson, J. L., Hall, W., & Andrews, M. L. (1995). Risk of cardiac events in family members of patients with long QT syndrome. Journal of the American College of Cardiology, 26(7), 1685-1691. doi:10.1016/0735-1097(95)60383-2 PMID:7594104.
-
(1995)
Journal of the American College of Cardiology
, vol.26
, Issue.7
, pp. 1685-1691
-
-
Zareba, W.1
Moss, A.J.2
le Cessie, S.3
Locati, E.H.4
Robinson, J.L.5
Hall, W.6
Andrews, M.L.7
|