…04. Zhang et. al. “T2FA: Transparent Two-Factor Authentication.” June 15, 2018. IEEE Access. Retrieved from https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8386653 on April 30, 2020. Back to Citation 105. Konoth R.K., van der Veen V., Bos H. (2017) How Anywhere Com…
…r ML production readiness and technical debt reduction. Proceedings of the 2017 IEEE International Conference on Big Data. December 11-14, 2017:1123-1132. doi:10.1109/BigData.2017.8258038. Wolff RF, Moons KGM, Riley RD, et al; PROBAST Group†. PROBAST: a tool to assess the risk of…
…r ML production readiness and technical debt reduction. Proceedings of the 2017 IEEE International Conference on Big Data. December 11-14, 2017:1123-1132. doi:10.1109/BigData.2017.8258038. Wolff RF, Moons KGM, Riley RD, et al; PROBAST Group†. PROBAST: a tool to assess the risk of…
…ted Authorization Framework for EHR Services Using Attribute-Based Encryption,” IEEE Transactions on Services Computing, Volume 14, No. 6, p. 1 (2021) (discussing that health care providers are increasingly using Cloud-based EHR services to manage ePHI, which increases the possib…
…, Predicting heart failure readmission from clinical notes using deep learning (IEEE 2019). Back to Citation 150. The ONC Program's use of the term “intervention” is different from “clinical intervention” as defined under FDA regulation that includes a range of regulated products…
….ansi.org/Standards/hfes.aspx ) following publication of the final rule. ANSI/IEEE C63.19-2011 American National Standard for Methods of Measurement of Compatibility between Wireless Communications Devices and Hearing Aids (2011) (see 412.3.1, 702.5.1). This standard provides a…
ANSI/IEEE Std 754-2019 http://754r.ucbtest.org Scope: The IEEE 754-2008 standard expired in 2019, so a minor revision was undertaken, to determine a set of relatively non-controversial upward-compatible editorial corrections and clarifications and minor enhancements to the 2008 s…
… will appear in the symposium proceedings that will be published in the ACM and IEEE digital libraries. The official publication date of an accepted paper will be the date the proceedings are made available in the ACM Digital Library. This date may be up to two weeks prior to the…
…n URI Scheme ........................16 6.4.1 Node Field Generation Without the IEEE 802 Address ........17 6.5 Lock Capability Discovery ....................................19 6.6 Active Lock Discovery ........................................19 6.7 Usage Considerations .........…
…n URI Scheme ........................16 6.4.1 Node Field Generation Without the IEEE 802 Address ........17 6.5 Lock Capability Discovery ....................................19 6.6 Active Lock Discovery ........................................19 6.7 Usage Considerations .........…
… URI Scheme ........................ 16 6.4.1 Node Field Generation Without the IEEE 802 Address ........ 17 6.5 Lock Capability Discovery .................................... 19 6.6 Active Lock Discovery ........................................ 19 6.7 Usage Considerations ......…
… URI Scheme ........................ 16 6.4.1 Node Field Generation Without the IEEE 802 Address ........ 17 6.5 Lock Capability Discovery .................................... 19 6.6 Active Lock Discovery ........................................ 19 6.7 Usage Considerations ......…
… URI Scheme ........................ 16 6.4.1 Node Field Generation Without the IEEE 802 Address ........ 17 6.5 Lock Capability Discovery .................................... 19 6.6 Active Lock Discovery ........................................ 19 6.7 Usage Considerations ......…
… URI Scheme ........................ 16 6.4.1 Node Field Generation Without the IEEE 802 Address ........ 17 6.5 Lock Capability Discovery .................................... 19 6.6 Active Lock Discovery ........................................ 19 6.7 Usage Considerations ......…
… URI Scheme ........................ 16 6.4.1 Node Field Generation Without the IEEE 802 Address ........ 17 6.5 Lock Capability Discovery .................................... 19 6.6 Active Lock Discovery ........................................ 19 6.7 Usage Considerations ......…