2,149
Views
33
CrossRef citations to date
0
Altmetric
Articles

A Survey of Big Data Issues in Electronic Health Record Analysis

, , , , , & show all

References

  • Alpaydin, E. 2010. Introduction to machine learning (2nd ed). Cambridge, MA: The MIT Press.
  • Alwatban, I. S., and A. Z. Emam. 2014. Comprehensive survey on privacy preserving association rule mining: Models, approaches, techniques and algorithms. International Journal on Artificial Intelligence Tools 23:5. doi:10.1142/S0218213014500043.
  • Amato, F., G. D. Pietro, M. Esposito, and N. Mazzocca. 2015. An integrated framework for securing semi-structured health records. Knowledge-Based Systems 79:99–117. doi:10.1016/j.knosys.2015.02.004.
  • An, A., and N. Cercone, 1999. An empirical study on rule quality measures. In Proceedings of the 7th international workshop on new directions in rough sets, data mining, and granular-soft computing. RSFDGrC ’99, pp. 482–491. London, UK: Springer-Verlag.
  • Asri, H., H. Mousannif, H. A. Moatassime, and T. Noel. June 2015. Big data in healthcare: challenges and opportunities. Paper presented at the 2015 International Conference on Cloud Technologies and Applications (CloudTech), Marrakesh, Morocco, June 2–4, 2015, pp. 1–7.
  • Baer, H. J., I. Cho, R. A. Walmer, P. A. Bain, and D. W. Bates. 2013. Using electronic health records to address overweight and obesity: A systematic review. American Journal of Preventive Medicine 45 (4):494–500. doi:10.1016/j.amepre.2013.05.015.
  • Bahtiyar, Ş., and M. U. Çağlayan. 2014. Trust assessment of security for e-health systems. Electronic Commerce Research and Applications 13 (3):164–177. doi:10.1016/j.elerap.2013.10.003.
  • Ben-Assuli, O. 2015. Electronic health records, adoption, quality of care, legal and privacy issues and their implementation in emergency departments. Health Policy 119 (3):287–297. doi:10.1016/j.healthpol.2014.11.014.
  • Bergadano, F., S. Matwin, R. S. Michalski, and J. Zhang. 1988. Measuring quality of concept descriptions. In Proceedings of the 3rd european working session on learning, pp. 1–14. Glasgow, UK, October 1988.
  • Berger, M. L., C. Lipset, A. Gutteridge, K. Axelsen, P. Subedi, and D. Madigan. 2015. Optimizing the leveraging of real-world data to improve the development and use of medicines. Value in Health 18 (1):127–130. doi:10.1016/j.jval.2014.10.009.
  • Brown, C. L., M. B. Irby, T. T. Houle, and J. A. Skelton. 2015. Family-based obesity treatment in children with disabilities. Academic Pediatrics 15 (2):197–203. doi:10.1016/j.acap.2014.11.004.
  • Bruha, I., and S. Kocková. 1993. Quality of decision rules: Empirical and statistical approaches. Informatica (Slovenia) 17:3.
  • Burns, A., and M. Johnson. 2015. Securing health information. IT Professional 17 (1):23–29. doi:10.1109/MITP.2015.13.
  • Chazard, E., C. Mouret, G. Ficheur, A. Schaffar, J.-B. Beuscart, and R. Beuscart. 2014. Proposal and evaluation of fasdim, a fast and simple de-identification method for unstructured free-text clinical records. International Journal of Medical Informatics 83 (4):303–312. doi:10.1016/j.ijmedinf.2013.11.005.
  • Chi, E. C., and T. G. Kolda. 2012. On tensors, sparsity, and nonnegative factorizations. SIAM Journal on Matrix Analysis and Applications 33 (4):1272–1299. doi:10.1137/110859063.
  • Chignell, M., M. Rouzbahman, R. Kealey, R. Samavi, E. Yu, and T. Sieminowski. 2013. Nonconfidential patient types in emergency clinical decision support. Security Privacy IEEE 11 (6):12–18.
  • Chung, S., B. Zhao, D. Lauderdale, R. Linde, R. Stafford, and L. Palaniappan. 2015. Initiation of treatment for incident diabetes: Evidence from the electronic health records in an ambulatory care setting. Primary Care Diabetes 9 (1):23–30. doi:10.1016/j.pcd.2014.04.005.
  • Cichocki, A., R. I. Zdunek, and S. Amari. 2008. Nonnegative matrix and tensor factorization [Lecture Notes]. IEEE Signal Processing Magazine 25 (1):142–145. doi:10.1109/MSP.2008.4408452.
  • Cyganek, B. 2013. Object detection and recognition in digital images. Theory and practice. Chichester, United Kingdom: John Wiley & Sons Ltd.
  • Cyganek, B., M. Grana, A. Kasprzak, K. Walkowiak, and M. Wozniak 2015. Selected aspects of electronic health record analysis from the big data perspective. In 2015 IEEE international conference on bioinformatics and biomedicine (BIBM), pp. 1391–1396. IEEE.
  • Cyganek, B., and M. Wozniak. 2015. Tensor based representation and analysis of the electronic healthcare record data. In 2015 ieee international conference on bioinformatics and biomedicine (BIBM), pp. 1383–1390. IEEE.
  • Dawson, P., R. Gailis, and A. Meehan. 2015. Detecting disease outbreaks using a combined Bayesian network and particle filter approach. Journal of Theoretical Biology 370:171–183. doi:10.1016/j.jtbi.2015.01.023.
  • Dean, P., and A. Famili. 1997. Comparative performance of rule quality measures in an induction system. Applied Intelligence 7 (2):113–124. doi:10.1023/A:1008293727412.
  • del Río, S., V. López, J. M. Benítez, and F. Herrera. 2015. A MapReduce approach to address big data classification problems based on the fusion of linguistic fuzzy rules. International Journal of Computational Intelligence Systems 8 (3):422–437. doi:10.1080/18756891.2015.1017377.
  • Dolera Tormo, G., F. Gomez Marmol, J. Girao, and G. Martinez Perez. 2013. Identity management–in privacy we trust: Bridging the trust gap in ehealth environments. IEEE Security & Privacy 11 (6):34–41. doi:10.1109/MSP.2013.80.
  • Doroz, R., P. Porwik, and T. Orczyk. 2016. Dynamic signature verification method based on association of features with similarity measures. Neurocomputing 171:921–931. doi:10.1016/j.neucom.2015.07.026.
  • Duda, R. O., P. E. Hart, and D. G. Stork. 2001. Pattern classification (2nd ed.). New York, NY: Wiley.
  • El-Sappagh, S. H., and S. El-Masri. 2014. A distributed clinical decision support system architecture. Journal of King Saud University - Computer and Information Sciences 26 (1):69–78. doi:10.1016/j.jksuci.2013.03.005.
  • Erl, T., R. Puttini, and Z. Mahmood. 2013. Cloud computing: Concepts, technology & architecture. Upper Saddle River, NJ, USA: Prentice Hall Press.
  • Ermakova, T., and B. Fabian 2013. Secret sharing for health data in multi-provider clouds. In 2013 IEEE 15th conference on business informatics (CBI), pp. 93–100. IEEE.
  • Fernández, A., S. del Río, V. López, A. Bawakid, M. J. Del Jesús, J. M. Bentez, and F. Herrera. 2014. Big data with cloud computing: An insight on the computing environment, MapReduce, and programming frameworks. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 4 (5):380–409.
  • Fernandez-Aleman, J. L., I. C. Senor, P. Á. O. Lozoya, and A. Toval. 2013. Security and privacy in electronic health records: A systematic literature review. Journal of Biomedical Informatics 46 (3):541–562. doi:10.1016/j.jbi.2012.12.003.
  • Flood, T. L., Y.-Q. Zhao, E. J. Tomayko, A. Tandias, A. L. Carrel, and L. P. Hanrahan. 2015. Electronic health records and community health surveillance of childhood obesity. American Journal of Preventive Medicine 48 (2):234–240. doi:10.1016/j.amepre.2014.10.020.
  • Gai, K., M. Qiu, L. C. Chen, and M. Liu 2015. Electronic health record error prevention approach using ontology in big data. In High performance computing and communications (hpcc), 2015 IEEE 7th international symposium on cyberspace safety and security (css), 2015 IEEE 12th international conference on embedded software and systems (icess), pp. 752–757. IEEE.
  • Gkoulalas-Divanis, A., G. Loukides, and J. Sun. 2014. Publishing data from electronic health records while preserving privacy: A survey of algorithms. Journal of Biomedical Informatics 50:4–19. doi:10.1016/j.jbi.2014.06.002.
  • Gotz, D., F. Wang, and A. Perer. 2014. A methodology for interactive mining and visual analysis of clinical event patterns using electronic health record data. Journal of Biomedical Informatics 48:148–159. doi:10.1016/j.jbi.2014.01.007.
  • Graña, M., and K. Jackwoski 2015. Electronic health record: A review. In 2015 IEEE international conference on bioinformatics and biomedicine (BIBM), pp. 1375–1382. IEEE.
  • Green, B. B., M. L. Anderson, A. J. Cook, S. Catz, P. A. Fishman, J. B. McClure, and R. Reid. 2012. Using body mass index data in the electronic health record to calculate cardiovascular risk. American Journal of Preventive Medicine 42 (4):342–347. doi:10.1016/j.amepre.2011.12.009.
  • Gur-Ali, O., and W. A. Wallace. 1993. Induction of rules subject to a quality constraint: Probabilistic inductive learning. IEEE Transactions on Knowledge and Data Engineering 5 (6):979–984. doi:10.1109/69.250081.
  • Hanauer, D., J. Aberdeen, S. Bayer, B. Wellner, C. Clark, K. Zheng, and L. Hirschman. 2013. Bootstrapping a de-identification system for narrative patient records: Cost-performance tradeoffs. International Journal of Medical Informatics 82 (9):821–831. doi:10.1016/j.ijmedinf.2013.03.005.
  • Hazan, T., S. Polak, and A. Shashua. 2005. Sparse image coding using a 3d non-negative tensor factorization. In Tenth IEEE international conference on computer vision (ICCV’05), vol. 1. pp. 50–57.
  • Ho, J. C., J. Ghosh, and J. Sun. 2014. Marble: High-throughput phenotyping from electronic health records via sparse nonnegative tensor factorization. In Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining (KDD ’14), pp.115–124. New York, NY, USA: ACM. doi:10.1145/2623330.2623658.
  • Hou, J. K., T. D. Imler, and T. F. Imperiale. 2014. Current and future applications of natural language processing in the field of digestive diseases. Clinical Gastroenterology and Hepatology 12 (8):1257–1261. doi:10.1016/j.cgh.2014.05.013.
  • Hu, Y., and G. Bai. 2014. A systematic literature review of cloud computing in ehealth. Health Informatics: An International Journal 3 (4). http://arxiv.org/abs/1412.2494.
  • Huang, L.-C., H.-C. Chu, C.-Y. Lien, C.-H. Hsiao, and T. Kao. 2009. Privacy preservation and information security protection for patients’ portable electronic health records. Computers in Biology and Medicine 39 (9):743–750. doi:10.1016/j.compbiomed.2009.06.004.
  • Kashfi, H. 2011. The intersection of clinical decision support and electronic health record: A literature review. In Proceedings of the federated conference on computer science and information systems (FedCIS) 2011, Szczecin, Poland, September 18–21, 2011, pp. 347–353.
  • Katt, B. 2014. A comprehensive overview of security monitoring solutions for e-health systems. In 2014 IEEE international conference on healthcare informatics (ICHI), pp. 364–364. IEEE.
  • Kim, D., S. Labkoff, and S. H. Holliday. 2008. Opportunities for electronic health record data to support business functions in the pharmaceutical industry—A case study from Pfizer, inc. Journal of the American Medical Informatics Association 15 (5):581–584. doi:10.1197/jamia.M2605.
  • Klinkowski, M., and K. Walkowiak. 2013. On the advantages of elastic optical networks for provisioning of cloud computing traffic. IEEE Network 27 (6):44–51. doi:10.1109/MNET.2013.6678926.
  • Kohn, L., J. Corrigan, and M. Donaldson. 2000. To err is human: Building a safer health system. Washington, DC: National Academy Press.
  • Kolda, T. G., and B. W. Bader. 2009. Tensor decompositions and applications. SIAM Review 51 (3):455–500. doi:10.1137/07070111X.
  • Krawczyk, B., and M. Woźniak. 2013. Distributed privacy-preserving minimal distance classification. Paper presented at the Proceedings of the Hybrid Artificial Intelligent Systems - 8th International Conference, HAIS 2013, Salamanca, Spain, September 11–13, 2013.
  • Kreuzthaler, M., S. Schulz, and A. Berghold. 2015. Secondary use of electronic health records for building cohort studies through top-down information extraction. Journal of Biomedical Informatics 53:188–195. doi:10.1016/j.jbi.2014.10.010.
  • Kudlacik, P., P. Porwik, and T. Wesolowski. 2016. Fuzzy approach for intrusion detection based on users commands. Soft Computing 20 (7):2705–2719. http://link.springer.com/article/10.1007/s00500-015-1669-6.
  • Kukafka, R., J. S. Ancker, C. Chan, J. Chelico, S. Khan, S. Mortoti, K. Natarajan, K. Presley, and K. Stephens. 2007. Redesigning electronic health record systems to support public health. Journal of Biomedical Informatics 40 (4):398–409. doi:10.1016/j.jbi.2007.07.001.
  • Lathauwer, L. D., B. D. Moor, and J. Vandewalle. 2000a. A multilinear singular value decomposition. SIAM Journal on Matrix Analysis and Applications 21 (4):1253–1278. doi:10.1137/S0895479896305696.
  • Lathauwer, L. D., B. D. Moor, and J. Vandewalle. 2000b. On the best rank-1 and rank-(r1, r2, …, rn) approximation of higher-order tensors. SIAM Journal on Matrix Analysis and Applications 21 (4):1324–1342. doi:10.1137/S0895479898346995.
  • Lauterbur, P. C. 1973. Image formation by induced local interactions: Examples employing nuclear magnetic resonance. Nature 242:190–191. doi:10.1038/242190a0.
  • Le Bihan, D., E. Breton, D. Lallemand, P. Grenier, and E. Cabanis, and M. Laval-Jeantet. 1986. Mr imaging of intravoxel incoherent motions: Application to diffusion and perfusion in neurologic disorders. Radiology 161 (2):401–407. doi:10.1148/radiology.161.2.3763909.
  • Li, Y., C. Bai, and C. K. Reddy. 2016. A distributed ensemble approach for mining healthcare data under privacy constraints. Information Sciences 330:245–259. doi:10.1016/j.ins.2015.10.011.
  • Lirov, Y., and O.-C. Yue. 1991. Automated network troubleshooting knowledge acquisition. Applied Intelligence 1:121–132. doi:10.1007/BF00058878.
  • Liu, X., R. Lu, J. Ma, L. Chen, and B. Qin. 2016. Privacy-preserving patient-centric clinical decision support system on naïve Bayesian classification. IEEE Journal of Biomedical and Health Informatics 20 (2):655–668. doi:10.1109/JBHI.2015.2407157.
  • Liu, Y., Y. Liu, and K. C. C. Chan. 2010. Tensor distance based multilinear locality-preserved maximum information embedding. IEEE Transactions on Neural Networks 21 (11):1848–1854. doi:10.1109/TNN.2010.2066574.
  • Loukides, G., J. Liagouris, A. Gkoulalas-Divanis, and M. Terrovitis. 2014. Disassociation for electronic health record privacy. Journal of Biomedical Informatics 50:46–61. doi:10.1016/j.jbi.2014.05.009.
  • Malin, B., S. Nyemba, and J. Paulett. 2011. Learning relational policies from electronic health record access logs. Journal of Biomedical Informatics 44 (2):333–342. doi:10.1016/j.jbi.2011.01.007.
  • Martínez-Pérez, B., I. de la Torre-Díez, M. López-Coronado, and J. J. P. C. Rodrigues. 2015. Are mobile health cloud apps better than native? In 2015 IEEE international conference on communications (ICC), pp. 518–523. IEEE.
  • Mashayekhi, M., F. Prescod, B. Shah, L. Dong, K. Keshavjee, and A. Guergachi. 2015. Evaluating the performance of the Framingham diabetes risk scoring model in Canadian electronic medical records. Canadian Journal of Diabetes 39 (2):152–156. doi:10.1016/j.jcjd.2014.10.006.
  • Mathew, P. S., and A. S. Pillai, 2015. Big data solutions in healthcare: Problems and perspectives. Paper presented at the 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Karpagam College of Engineering, Othakkalmandapam (PO), Coimbatore, Tamilnadu, India, March 17–18, 2016, pp. 1–6.
  • Mertz, L. 2014. Saving lives and money with smarter hospitals: Streaming analytics, other new tech help to balance costs and benefits. IEEE Pulse 5 (6):33–36. doi:10.1109/MPUL.2014.2355306.
  • Michelson, J. D., J. S. Pariseau, and W. C. Paganelli. 2014. Assessing surgical site infection risk factors using electronic medical records and text mining. American Journal of Infection Control 42 (3):333–336. doi:10.1016/j.ajic.2013.09.007.
  • Michel-Verkerke, M. B., R. A. Stegwee, and T. A. Spil. 2015. The six P’s of the next step in electronic patient records in the Netherlands. Health Policy and Technology 4:137–143. doi:10.1016/j.hlpt.2015.02.011.
  • Mohammed, N., S. Barouti, D. Alhadidi, and R. Chen 2015. Secure and private management of healthcare databases for data mining. In 2015 IEEE 28th international symposium on computer-based medical systems (CBMS), pp. 191–196. IEEE.
  • Moor, G. D., M. Sundgren, D. Kalra, A. Schmidt, M. Dugas, B. Claerhout, T. Karakoyun, et al. 2015. Using electronic health records for clinical research: The case of the EHR4CR project. Journal of Biomedical Informatics 53:162–173. doi:10.1016/j.jbi.2014.10.006.
  • Newhauser, W., T. Jones, S. Swerdloff, W. Newhauser, M. Cilia, R. Carver, A. Halloran, and R. Zhang. 2014. Anonymization of DICOM electronic medical records for radiation therapy. Computers in Biology and Medicine 53:134–140. doi:10.1016/j.compbiomed.2014.07.010.
  • Nguyen, L., E. Bellucci, and L. T. Nguyen. 2014. Electronic health records implementation: An evaluation of information system impact and contingency factors. International Journal of Medical Informatics 83 (11):779–796. doi:10.1016/j.ijmedinf.2014.06.011.
  • Nguyen, P. A., S. Syed-Abdul, U. Iqbal, M.-H. Hsu, C.-L. Huang, H.-C. Li, D. L. Clinciu, W.-S. Jian, and Y.-C. J. Li. 2013. A probabilistic model for reducing medication errors. PLoS ONE 8 (12):1–7. doi:10.1371/journal.pone.0082401.
  • Núñez, M. 1988. Economic induction: A case study. In Proceedings of the 3rd european working session on learning, pp. 139–145. Glasgow, UK, October 1988.
  • Oakkar, E. E., J. Stevens, P. T. Bradshaw, J. Cai, K. M. Perreira, B. M. Popkin, P. Gordon-Larsen, D. R. Young, N. R. Ghai, B. Caan, and V. P. Quinn. 2015. Longitudinal study of acculturation and BMI change among Asian American men. Preventive Medicine 73:15–21. doi:10.1016/j.ypmed.2015.01.009.
  • Peng, Y., Q. Huang, P. Jiang, and J. Jiang. 2005. Cost-sensitive ensemble of support vector machines for effective detection of microcalcification in breast cancer diagnosis. In Fuzzy systems and knowledge discovery, ed. L. Wang and Y. Jin, 483–483. Lecture Notes in Computer Science, 3614. Berlin /Heidelberg: Springer.
  • Reich, A. 2012. Disciplined doctors: The electronic medical record and physicians’ changing relationship to medical knowledge. Social Science & Medicine 74 (7):1021–1028. doi:10.1016/j.socscimed.2011.12.032.
  • Remen, V. M., and A. Grimsmo. 2011. Closing information gaps with shared electronic patient summaries—How much will it matter? International Journal of Medical Informatics 80 (11):775–781. doi:10.1016/j.ijmedinf.2011.08.008.
  • Rossi, E., M. Rosa, L. Rossi, A. Priori, and S. Marceglia. 2014. Webbiobank: A new platform for integrating clinical forms and shared neurosignal analyzes to support multi-centre studies in Parkinson’s disease. Journal of Biomedical Informatics 52:92–104. doi:10.1016/j.jbi.2014.08.014.
  • Rubbo, B., N. K. Fitzpatrick, S. Denaxas, M. Daskalopoulou, N. Yu, R. S. Patel, and H. Hemingway. 2015. Use of electronic health records to ascertain, validate and phenotype acute myocardial infarction: A systematic review and recommendations. International Journal of Cardiology 187:705–711. doi:10.1016/j.ijcard.2015.03.075.
  • Schapire, R. E. 2001. The boosting approach to machine learning: An overview. Paper presented at the MSRI Workshop on Nonlinear Estimation and Classification, Berkeley, CA, USA, March 19–29, 2001.
  • Shang, J., E. Larson, J. Liu, and P. Stone. 2015. Infection in home health care: Results from national outcome and assessment information set data. American Journal of Infection Control 43 (5):454–459. doi:10.1016/j.ajic.2014.12.017.
  • Simplicio, M., L. Iwaya, B. Barros, T. Carvalho, and M. Naslund. 2015. Secourhealth: A delay-tolerant security framework for mobile health data collection. IEEE Journal of Biomedical and Health Informatics 19 (2):761–772. doi:10.1109/JBHI.2014.2320444.
  • Tan, M., and J. C. Schlimmer. 1989. Cost-sensitive concept learning of sensor use in approach and recognition. In Proceedings of the sixth international workshop on machine learning. San Francisco, CA, USA: Morgan Kaufmann.
  • Tran, T., T. D. Nguyen, D. Phung, and S. Venkatesh. 2015. Learning vector representation of medical objects via emr-driven nonnegative restricted Boltzmann machines (enrbm). Journal of Biomedical Informatics 54:96–105. doi:10.1016/j.jbi.2015.01.012.
  • Trcek, D., and A. Brodnik. 2013. Hard and soft security provisioning for computationally weak pervasive computing systems in e-health. IEEE Wireless Communications 20 (4):22–29. doi:10.1109/MWC.2013.6590047.
  • Tucker, L. R. 1966. Some mathematical notes on three-mode factor analysis. Psychometrika 31 (3):279–311. doi:10.1007/BF02289464.
  • Vaidya, J., B. Shafiq, W. Fan, D. Mehmood, and D. Lorenzi. 2014. A random decision tree framework for privacy-preserving data mining. IEEE Transactions on Dependable and Secure Computing 11 (5):399–411. doi:10.1109/TDSC.2013.43.
  • Vedanthan, R., E. Blank, N. Tuikong, J. Kamano, L. Misoi, D. Tulienge, C. Hutchinson, et al. 2015. Usability and feasibility of a tablet-based decision-support and integrated record-keeping (desire) tool in the nurse management of hypertension in rural western Kenya. International Journal of Medical Informatics 84 (3):207–219. doi:10.1016/j.ijmedinf.2014.12.005.
  • Venters, W., and E. Whitley. 2012. A critical review of cloud computing: Researching desires and realities. Journal of Information Technology 27 (3):179–197. doi:10.1057/jit.2012.17.
  • Verdenius, F., 1991. A method for inductive cost optimization. In Proceedings of the European working session on machine learning. London, UK: Springer-Verlag.
  • Vijayakrishnan, R., S. R. Steinhubl, K. Ng, J. Sun, R. J. Byrd, Z. Daar, B. A. Williams, et al. 2014. Prevalence of heart failure signs and symptoms in a large primary care population identified through the use of text and data mining of the electronic health record. Journal of Cardiac Failure 20 (7):459–464. doi:10.1016/j.cardfail.2014.03.008.
  • Villa, L. B., and I. Cabezas 2014. A review on usability features for designing electronic health records. In 2014 IEEE 16th international conference on e-health networking, applications and services (Healthcom), pp. 49–54. IEEE.
  • Vivas-Consuelo, D., R. Usó-Talamantes, J. L. Trillo-Mata, M. Caballer-Tarazona, I. Barrachina-Martnez, and L. Buigues-Pastor. 2014. Predictability of pharmaceutical spending in primary health services using clinical risk groups. Health Policy 116 (2–3):188–195. doi:10.1016/j.healthpol.2014.01.012.
  • Walkowiak, K., M. Woźniak, M. Klinkowski, and W. Kmiecik. 2015. Optical networks for cost-efficient and scalable provisioning of big data traffic. International Journal of Parallel, Emergent and Distributed Systems 30 (1):15–28. doi:10.1080/17445760.2014.924516.
  • Wang, H., and N. Ahuja. 2007. A tensor approximation approach to dimensionality reduction. International Journal of Computer Vision 76 (3):217–229. 10.1007/s11263-007-0053-0.
  • Wang, Y., R. Chen, J. Ghosh, J. C. Denny, A. Kho, Y. Chen, B. A. Malin, and J. Sun. 2015. Rubik: Knowledge guided tensor factorization and completion for health data analytics. In Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining. KDD ’15. New York, NY, USA: ACM. 10.1145/2783258.2783395.
  • Widmer, G., and M. Kubat. 1996. Learning in the presence of concept drift and hidden contexts. Mach Learning 23 (1):69–101. doi:10.1007/BF00116900.
  • Wozniak, M., A. Kasprzak, and P. Cal. 2013. Application of combined classifiers to data stream classification. In Proceedings of the 10th international conference on flexible query answering systems (FQAS 2013). LNCS. Berlin, Heidelberg: Springer-Verlag. in press.
  • Xu, L., C. Jiang, J. Wang, J. Yuan, and Y. Ren. 2014. Information security in big data: Privacy and data mining. IEEE Access 2:1149–1176. doi:10.1109/ACCESS.2014.2362522.
  • Zhang, X., W. Dou, J. Pei, S. Nepal, C. Yang, C. Liu, and J. Chen. 2015. Proximity-aware local-recoding anonymization with MapReduce for scalable big data privacy preservation in cloud. IEEE Transactions on Computers 64 (8):2293–2307. doi:10.1109/TC.2014.2360516.
  • Zhong, Y., P.-J. Lin, J. T. Cohen, A. N. Winn, and P. J. Neumann. 2015. Cost-utility analyzes in diabetes: A systematic review and implications from real-world evidence. Value in Health 18 (2):308–314. doi:10.1016/j.jval.2014.12.004.
  • Zhou, J., Z. Cao, X. Dong, X. Lin, and A. Vasilakos. 2013. Securing m-healthcare social networks: Challenges, countermeasures and future directions. IEEE Wireless Communications 20 (4):12–21. doi:10.1109/MWC.2013.6590046.
  • Zuccon, G., D. Kotzur, A. Nguyen, and A. Bergheim. 2014. De-identification of health records using anonym: Effectiveness and robustness across datasets. Artificial Intelligence in Medicine 61 (3):145–151. doi:10.1016/j.artmed.2014.03.006.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.