Framework, strategy and evaluation of health care processes with RFID
暂无分享,去创建一个
[1] Alexander L. Wolf,et al. Software process validation: quantitatively measuring the correspondence of a process to a model , 1999, TSEM.
[2] W. Hersh,et al. Health care information technology: progress and barriers. , 2004, JAMA.
[3] Marc Berg,et al. Considerations for sociotechnical design: experiences with an electronic patient record in a clinical context , 1998, Int. J. Medical Informatics.
[4] James Cornford,et al. Computer Systems Development: History, organization and implementation , 1990 .
[5] Seth J. Seidman,et al. Electromagnetic compatibility of pacemakers and implantable cardiac defibrillators exposed to RFID readers , 2007, Int. J. Radio Freq. Identif. Technol. Appl..
[6] Selwyn Piramuthu,et al. Protocols for RFID tag/reader authentication , 2007, Decis. Support Syst..
[7] Selwyn Piramuthu,et al. Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[8] Tony Yu-Ju Tu,et al. Identifying RFID-embedded objects in pervasive healthcare applications , 2009, Decis. Support Syst..
[9] Enid Mumford,et al. Computer systems in work design--the ETHICS method : effective technical and human implementation of computer systems , 1979 .
[10] Wei Zhou,et al. RFID and item-level information visibility , 2009, Eur. J. Oper. Res..
[11] Alexander L. Wolf,et al. Discovering models of software processes from event-based data , 1998, TSEM.
[12] David F. Lobach,et al. Medical data mining: knowledge discovery in a clinical data warehouse , 1997, AMIA.
[13] San-Yih Hwang,et al. A process-mining framework for the detection of healthcare fraud and abuse , 2006, Expert Syst. Appl..
[14] Marc Berg,et al. Patient care information systems and health care work: a sociotechnical approach , 1999, Int. J. Medical Informatics.
[15] Elske Ammenwerth,et al. Evaluation of health information systems - problems and challenges , 2003, Int. J. Medical Informatics.
[16] Tony Yu-Ju Tu,et al. RFID-enabled item-level retail pricing , 2009, Decis. Support Syst..
[17] Dimitrios Gunopulos,et al. Mining Process Models from Workflow Logs , 1998, EDBT.
[18] R. Van der Togt,et al. Electromagnetic interference from radio frequency identification inducing potentially hazardous incidents in critical care medical equipment. , 2008, JAMA.
[19] Joshua W. Guag,et al. In vitro tests reveal sample radiofrequency identification readers inducing clinically significant electromagnetic interference to implantable pacemakers and implantable cardioverter-defibrillators. , 2010, Heart rhythm.