Author of the publication

Evaluation of CoViSTA - an Automated Vital Sign Documentation System - in an Inpatient Hospital Setting.

, , , , , , and . AMIA, AMIA, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proxy and Threshold One-Time Signatures., and . ACNS, volume 2846 of Lecture Notes in Computer Science, page 123-136. Springer, (2003)Authentication of Concast Communication., , and . INDOCRYPT, volume 2551 of Lecture Notes in Computer Science, page 185-198. Springer, (2002)Authenticating Multicast Streams in Lossy Channels Using Threshold Techniques., and . ICN (2), volume 2094 of Lecture Notes in Computer Science, page 239-249. Springer, (2001)Authentication of Anycast Communication., and . MMM-ACNS, volume 2776 of Lecture Notes in Computer Science, page 419-423. Springer, (2003)Evaluation of CoViSTA - an Automated Vital Sign Documentation System - in an Inpatient Hospital Setting., , , , , , and . AMIA, AMIA, (2005)A Signcryption Scheme Based on Secret Sharing Technique.. MMM-ACNS, volume 2776 of Lecture Notes in Computer Science, page 279-288. Springer, (2003)Authentication of transit flows and k-siblings one-time signature., and . Communications and Multimedia Security, volume 228 of IFIP Conference Proceedings, page 41-55. Kluwer, (2002)A Security Analysis for Label Switching Routers., , and . AICCSA, page 526-530. IEEE Computer Society, (2001)Research review on performance evaluation of a parabolic trough solar collector for hot water generation, , , , and . Global Journal of Engineering and Technology Advances, 18 (1): 027–032 (April 2024)