Results 81 to 90 of about 7,474,745 (317)

Privacy-Preserving Classification on Deep Learning with Exponential Mechanism

open access: yesInternational Journal of Computational Intelligence Systems
How to protect the privacy of training data in deep learning has been the subject of increasing amounts of related research in recent years. Private Aggregation of Teacher Ensembles (PATE) uses transfer learning and differential privacy methods to ...
Quan Ju   +3 more
doaj   +1 more source

Formal and informal social care in people with Rheumatic and Musculoskeletal diseases: a cross‐sectional multicentre survey

open access: yesArthritis Care &Research, Accepted Article.
Introduction Rheumatic and musculoskeletal diseases(RMDs) are leading causes of physical disability, necessitating support with activities of daily living(ADLs). This study describes social care received by patients with RMDs in two disperate regions of England: Salford(urban) and Norfolk(rural).
Mehreen Somro   +6 more
wiley   +1 more source

Analytical control laws for interplanetary solar sail trajectories with constraints [PDF]

open access: yes, 2008
An indirect method is used to obtain an analytical control law for a spacecraft with a low-thrust propulsion system which is constituted by a solar sail coupled with a solar electric thruster. Constraints on the control inputs for such as the system need
McInnes, C.R., Uchiyama, Kenji
core  

Safety of Prescription Nonsteroidal Anti‐inflammatory Drugs in Adults with Inflammatory Bowel Disease: Data from a Large Administrative Claims Cohort

open access: yesArthritis Care &Research, Accepted Article.
Objectives The concern that nonsteroidal anti‐inflammatory drugs (NSAIDs) may precipitate flares of inflammatory bowel disease (IBD) has limited their use in managing musculoskeletal symptoms in this population, but safety data are mixed. Methods This retrospective cohort study included patients with IBD ≥ 18 years of age from Optum's de‐identified ...
Adam S. Mayer   +4 more
wiley   +1 more source

Transmission of computer data- moveable matter in criminal law [PDF]

open access: yesZbornik Radova Pravnog Fakulteta u Splitu, 2016
Criminal law response to the development of information and communication technology and misuse of public communications service for a long period of time does not follow contemporary models of collection of digital electronic communications services ...
Dražen Škrtić
doaj  

Computer network operations and ‘rule-with-law’ in Australia

open access: yesInternet Policy Review, 2017
Computer Network Operations (CNOs) refers to government intrusion and/or interference with networked information communication infrastructures for the purposes of law enforcement and security intelligence.
Adam Molnar   +2 more
doaj   +1 more source

An Economic Assessment of UCITA [PDF]

open access: yes
The Uniform Computer Information Transactions Act (UCITA) is a model contract law developed by the National Conference of Commissioners on Uniform State Laws (NCCUSL).
Hahn, Robert W., Layne-Farrar, Anne
core   +1 more source

A Q‐Learning Algorithm to Solve the Two‐Player Zero‐Sum Game Problem for Nonlinear Systems

open access: yesInternational Journal of Adaptive Control and Signal Processing, Volume 39, Issue 3, Page 566-581, March 2025.
A Q‐learning algorithm to solve the two‐player zero‐sum game problem for nonlinear systems. ABSTRACT This paper deals with the two‐player zero‐sum game problem, which is a bounded L2$$ {L}_2 $$‐gain robust control problem. Finding an analytical solution to the complex Hamilton‐Jacobi‐Issacs (HJI) equation is a challenging task.
Afreen Islam   +2 more
wiley   +1 more source

Novelties in Russian criminal law on liability for personal data breaches

open access: yesУченые записки Казанского университета: Серия Гуманитарные науки
This article presents the results of the first critical legal analysis of a novel provision in Russian criminal law that penalizes anyone who engages in the illegal use, transfer, collection, or storage of computer information containing personal data ...
A. A. Shutova
doaj   +1 more source

Sharing knowledge without sharing data: on the false choice between the privacy and utility of information [PDF]

open access: yes, 2017
Presentation slides for Azer Bestavros' June 1, 2017 talk at the BU Law School.As part of an ongoing collaboration, the Law School hosted a talk by Azer Bestavros, BU Professor of Computer Science and the Director of the Hariri Institute for Computing ...
Bestavros, Azer
core  

Home - About - Disclaimer - Privacy