Results 71 to 80 of about 1,888,285 (303)

Generalized Preference Learning for Trust Network Inference

open access: yesIEEE Access, 2019
Trust inference is essential in a plethora of data mining and machine learning applications. Unfortunately, conventional approaches to trust inference assume trust networks are available, while in practice they must be derived from social network ...
Domenico Mandaglio, Andrea Tagarelli
doaj   +1 more source

Inpatient Food Insecurity and Pediatric Hematology Oncology Hospitalization Outcomes

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Children with cancer and blood disorders are at risk for food insecurity (FI). We aimed to describe the association of inpatient food insecurity (IFI) and hospitalization outcomes among patients admitted to the pediatric hematology oncology service. Of 325 caregivers screened for IFI, 60 (18.6%) screened positive.
Joanna M. Robles   +4 more
wiley   +1 more source

A formal theory of conceptual modeling universals [PDF]

open access: yes, 2004
Conceptual Modeling is a discipline of great relevance to several areas in Computer Science. In a series of papers [1,2,3] we have been using the General Ontological Language (GOL) and its underlying upper level ontology, proposed in [4,5], to evaluate ...
Guizzardi, Giancarlo   +2 more
core   +3 more sources

Metamodeling in EIA/CDIF - Meta-Metamodel and Metamodels [PDF]

open access: yes, 2002
This article introduces the EIA/CDIF set of standards for the modeling of information systems and its exchange among computer-aided software tools of different vendors.
Flatscher, Rony G.
core   +1 more source

Exploiting Opportunistic Coding in Throwbox-Based Multicast in Vehicular Delay Tolerant Networks

open access: yesIEEE Access, 2019
In vehicular delay tolerant networks (VDTNs), multicast has been increasingly popular due to new applications, among which large contents such as multimedia files play a major role. Under this circumstance, existing works have failed to provide efficient
Peng Liu   +3 more
doaj   +1 more source

Feasibility and Safety of High‐Dose Proton Re‐Irradiation in Recurrent Pediatric Central Nervous System Tumors: A Single‐Institution Retrospective Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Pediatric central nervous system (CNS) tumors often recur despite multimodality therapy. Although re‐irradiation (re‐RT) has historically been limited by concerns for severe late toxicities, modern techniques have renewed interest in this approach. Proton therapy provides dosimetric advantages that may enable curative re‐treatment with
Jin‐Ho Song   +15 more
wiley   +1 more source

Memory-Efficient Topic Modeling [PDF]

open access: yes, 2012
As one of the simplest probabilistic topic modeling techniques, latent Dirichlet allocation (LDA) has found many important applications in text mining, computer vision and computational biology.
Cao, Xiao-Qin, Liu, Zhi-Qiang, Zeng, Jia
core  

Revisit Point Cloud Recognition From the Viewpoint of Data Mixture

open access: yesIEEE Access, 2020
In recent years, point cloud based data analysis has attracted lots of attentions of researchers from many different fields because of its simplicity and effectiveness.
Zhenzhong Kuang, Xin Zhang, Zhiqiang Guo
doaj   +1 more source

Feasibility and Preliminary Efficacy of Integrative Neuromuscular Training for Childhood Cancer Survivors: A Pilot Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Survivors of childhood acute lymphoblastic leukemia (ALL) often exhibit early deficits in muscle and movement competence, which can compromise long‐term health. Integrative neuromuscular training (INT), a multifaceted approach combining fundamental movement activities with strength exercises, may help address these deficits during ...
Anna Maria Markarian   +7 more
wiley   +1 more source

Global Sensitivity Analysis of Stochastic Computer Models with joint metamodels [PDF]

open access: yes, 2009
The global sensitivity analysis method, used to quantify the influence of uncertain input variables on the response variability of a numerical model, is applicable to deterministic computer code (for which the same set of input variables gives always the
Iooss, Bertrand   +2 more
core   +3 more sources

Home - About - Disclaimer - Privacy