نتایج جستجو برای: requests

تعداد نتایج: 26503  

Journal: :Journal of the American Medical Informatics Association : JAMIA 2014
David A. Hanauer Rebecca Preib Kai Zheng Sung Won Choi

BACKGROUND AND OBJECTIVE Providing patients access to their medical records offers many potential benefits including identification and correction of errors. The process by which patients ask for changes to be made to their records is called an 'amendment request'. Little is known about the nature of such amendment requests and whether they result in modifications to the chart. METHODS We con...

Journal: :J. Graphics Tools 2008
Nicolas Brodu

This is an algorithm for finding neighbors for point objects that can freely move and have no predefined position. The query sphere consists of a center location and a given radius within which nearby objects must be found. Space is discretized in cubic cells. This algorithm introduces an indexing scheme that gives the list of all the cells making up the query sphere, for any radius and any cen...

2012

In the clinical toxicology laboratory, approximately 40% of the workload is usually serum alcohols and the remaining workload deals with drug screens, volatiles, other therapeutic drugs, over-the-counter drugs, and plant and animal toxins. GC is the gold standard for serum/blood alcohol determination. However, to determine serum alcohols in a busy medical center by GC is slow, costly, and requi...

Journal: :Indian journal of medical ethics 2015
Siddharth Sarkar Hiramalini Seshadri

Faith healing practices are common in the Indian subcontinent, for remedying physical as well as psychiatric disorders. Patients and/ or their family members often resort to such treatment, especially when dissatisfied with the usual medical care or when the patient has a terminal illness. The application of the principles of medical ethics varies across cultures and time, and with the ethical ...

Journal: :European Journal of Operational Research 2006
Daniel Dajun Zeng Moshe Dror Hsinchun Chen

In many mission-critical applications such as police and homeland security-related information systems, automated monitoring of relevant information sources is essential. Such monitoring results in a large number of periodic queries, which can significantly increase the load on a server that hosts information services. If the execution of these queries is not carefully scheduled on the server, ...

2012
Ben Hixon Rebecca J. Passonneau Susan L. Epstein

Ambiguous or open-ended requests to a dialogue system result in more complex dialogues. We present a semantic-specificity metric to gauge this complexity for dialogue systems that access a relational database. An experiment where a simulated user makes requests to a dialogue system shows that semantic specificity correlates with dialogue length.

Introduction: Various studies have demonstrated the benefits of using distributed fog computing for the Internet of Things (IoT). Fog computing has brought cloud computing capabilities such as computing, storage, and processing closer to IoT nodes. The new model of fog and edge computing, compared to cloud computing, provides less latency for data processing by bringing resources closer to user...

Nowadays, the use of various messaging services is expanding worldwide with the rapid development of Internet technologies. Telegram is a cloud-based open-source text messaging service. According to the US Securities and Exchange Commission and based on the statistics given for October 2019 to present, 300 million people worldwide used telegram per month. Telegram users are more concentrated in...

Journal: :Journal of Software Maintenance 2012
Huzefa H. Kagdi Malcom Gethers Denys Poshyvanyk Maen Hammad

The paper presents an approach to recommend a ranked list of expert developers to assist in the implementation of software change requests (e.g., bug reports and feature requests). An Information Retrieval (IR)-based concept location technique is first used to locate source code entities, e.g., files and classes, relevant to a given textual description of a change request. The previous commits ...

2006
Maarten Rits Mohammad Ashiqur Rahaman Maurice Donat

Web service specifications (WS*) have been designed with the aim of being composable to provide a rich set of tools for secure, reliable, and/or transacted web services. Due to the flexibility of SOAP-level security [1] mechanisms, web services may be vulnerable to a distinct class of attacks based on the malicious interception, manipulation, and transmission of SOAP messages, which are referre...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید