Khaled El Emam
Children's Hospital of Eastern Ontario
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Khaled El Emam.
Empirical Software Engineering | 2010
Gunes Koru; Hongfang Liu; Dongsong Zhang; Khaled El Emam
Recent studies on open-source software (OSS) products report that smaller modules are proportionally more defect prone compared to larger ones. This phenomenon, referred to as the Theory of Relative Defect Proneness (RDP), challenges the traditional QA approaches that give a higher priority to larger modules, and it attracts growing interest from closed-source software (CSS) practitioners. In this paper, we report the findings of a study where we tested the theory of RDP using ten CSS products. The results clearly confirm the theory of RDP. We also demonstrate the useful practical implications of this theory in terms of defect-detection effectiveness. Therefore, this study does not only make research contributions by rigorously testing a scientific theory for a different category of software products, but also provides useful insights and evidence to practitioners for revising their existing QA practices.
American Journal of Bioethics | 2013
Khaled El Emam; Elizabeth Jonker; Ester Moher; Luk Arbuckle
Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.
canadian conference on artificial intelligence | 2010
Marina Sokolova; Khaled El Emam; Sadrul Chowdhury; Emilio Neri; Sean Rose; Elizabeth Jonker
This study analyzes evaluation measures for rare event detection We introduce a procedure which is built upon the characteristics of rare events We propose properties for evaluation measures which assess the measure applicability to classification of rare events Prevention of leaks of personal health information supports the empirical evidence.
Journal of Law Medicine & Ethics | 2013
Khaled El Emam; Ester Moher
Two contemporary problems face public health professionals in collecting data from health care providers: the de-identification of geospatial information in a manner that still allows meaningful analysis, and ensuring that provider performance data (e.g., infection or screening rates) is complete and accurate. In this paper, we discuss new methods for de-identifying geographic information that will allow useful de-identified data to be disclosed to public health. In addition, we propose privacy preserving mechanisms that will likely encourage providers to disclose complete and accurate data. However, this must be accompanied by steps to grow trust between the providers and public health.
International Conference on E-Technologies | 2015
Hanna Farah; Daniel Amyot; Khaled El Emam
New drug studies are essential to advance the pharmaceutical industry’s ability to fight diseases. These studies are typically performed in four phases. We are interested in “phase 1” clinical trials where the goal is to evaluate the safety of a new drug. Contract research organizations recruit participants for their studies and need to verify electronically certain criteria without revealing the identity of these participants to other organizations. We outline some potential attacks against current identity representation schemes. Afterwards, we present privacy-preserving techniques to represent the identity of a participant in a scheme where operations can be performed efficiently and accurately. Our methods and scheme can also be applied to other domains to preserve an individual’s privacy.
American Journal of Bioethics | 2015
Ester Moher; Khaled El Emam
Nudging, or choice architecture, has become a more prominent concept in medicine. Some regard simple framing techniques or reminders as beneficial to patients, improving overall health; others rega...
Journal of Biomedical Informatics | 2015
Khaled El Emam; Hanna Farah; Saeed Samet; Aleksander Essex; Elizabeth Jonker; Murat Kantarcioglu; Craig C. Earle
OBJECTIVEnSome phase 1 clinical trials offer strong financial incentives for healthy individuals to participate in their studies. There is evidence that some individuals enroll in multiple trials concurrently. This creates safety risks and introduces data quality problems into the trials. Our objective was to construct a privacy preserving protocol to track phase 1 participants to detect concurrent enrollment.nnnDESIGNnA protocol using secure probabilistic querying against a database of trial participants that allows for screening during telephone interviews and on-site enrollment was developed. The match variables consisted of demographic information.nnnMEASUREMENTnThe accuracy (sensitivity, precision, and negative predictive value) of the matching and its computational performance in seconds were measured under simulated environments. Accuracy was also compared to non-secure matching methods.nnnRESULTSnThe protocol performance scales linearly with the database size. At the largest database size of 20,000 participants, a query takes under 20s on a 64 cores machine. Sensitivity, precision, and negative predictive value of the queries were consistently at or above 0.9, and were very similar to non-secure versions of the protocol.nnnCONCLUSIONnThe protocol provides a reasonable solution to the concurrent enrollment problems in phase 1 clinical trials, and is able to ensure that personal information about participants is kept secure.
The Canadian Journal of Hospital Pharmacy | 2009
Khaled El Emam; Fida Kamal Dankar; Régis Vaillancourt; Tyson Roffey; Mark Lysyk
Archive | 2013
Khaled El Emam; Luk Arbuckle
Proceedings of the Workshop on Adaptation of Language Resources and Technology to New Domains | 2009
Marina Sokolova; Khaled El Emam; Sean Rose; Sadrul Chowdhury; Emilio Neri; Elizabeth Jonker; Liam Peyton