Results 21 to 30 of about 2,306,542 (276)
Anonymization-based privacy protection ensures that data cannot be traced back to individuals. Researchers working in this area have proposed a wide variety of anonymization algorithms, many of which require a considerable number of database accesses. This is a problem of efficiency, especially when the released data is subject to visualization or when
Nergiz, Mehmet +2 more
openaire +3 more sources
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn +4 more
wiley +1 more source
$K$-anonymous Signaling Scheme [PDF]
We incorporate signaling scheme into Ad Auction setting, to achieve better welfare and revenue while protect users' privacy. We propose a new \emph{$K$-anonymous signaling scheme setting}, prove the hardness of the corresponding welfare/revenue ...
Chen, Binyi, Liu, Tie-Yan, Qin, Tao
core
Optimal Auctions vs. Anonymous Pricing
For selling a single item to agents with independent but non-identically distributed values, the revenue optimal auction is complex. With respect to it, Hartline and Roughgarden (2009) showed that the approximation factor of the second-price auction with
Alaei, Saeed +4 more
core +1 more source
Octopus: A Secure and Anonymous DHT Lookup [PDF]
Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; we thus set out to design a lookup ...
Borisov, Nikita, Wang, Qiyan
core +1 more source
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts +8 more
wiley +1 more source
Anonymity In Cyberspace: Judicial and Legislative Regulations [PDF]
Historically, the scope of constitutional protections for fundamental rights has evolved to keep pace with new social norms and new technology. Internet speech is on the rise. The First Amendment protects an individual’s right to speak anonymously, but
Qasir, Sophia
core +1 more source
Computing on Anonymous Quantum Network
This paper considers distributed computing on an anonymous quantum network, a network in which no party has a unique identifier and quantum communication and computation are available.
Kobayashi, Hirotada +2 more
core +1 more source
Cytoplasmic p21 promotes stemness of colon cancer cells via activation of the NFκB pathway
Cytoplasmic p21 promotes colorectal cancer stem cell (CSC) features by destabilizing the NFκB–IκB complex, activating NFκB signaling, and upregulating BCL‐xL and COX2. In contrast to nuclear p21, cytoplasmic p21 enhances spheroid formation and stemness transcription factor CD133.
Arnatchai Maiuthed +10 more
wiley +1 more source
The following PDF indicates errata for the original article entitled " Principal Component Analysis of Geomagnetic Data for the Panzhihua Earthquake (Ms 6.1) in August 2008" by Junhui Li, Qi Li, Dongmei Yang, Xingzhou Wang, Dequan Hong and Kang He.
Anonymous Anonymous
doaj +1 more source

