Results 81 to 90 of about 7,474,745 (317)
Privacy-Preserving Classification on Deep Learning with Exponential Mechanism
How to protect the privacy of training data in deep learning has been the subject of increasing amounts of related research in recent years. Private Aggregation of Teacher Ensembles (PATE) uses transfer learning and differential privacy methods to ...
Quan Ju +3 more
doaj +1 more source
Introduction Rheumatic and musculoskeletal diseases(RMDs) are leading causes of physical disability, necessitating support with activities of daily living(ADLs). This study describes social care received by patients with RMDs in two disperate regions of England: Salford(urban) and Norfolk(rural).
Mehreen Somro +6 more
wiley +1 more source
Analytical control laws for interplanetary solar sail trajectories with constraints [PDF]
An indirect method is used to obtain an analytical control law for a spacecraft with a low-thrust propulsion system which is constituted by a solar sail coupled with a solar electric thruster. Constraints on the control inputs for such as the system need
McInnes, C.R., Uchiyama, Kenji
core
Objectives The concern that nonsteroidal anti‐inflammatory drugs (NSAIDs) may precipitate flares of inflammatory bowel disease (IBD) has limited their use in managing musculoskeletal symptoms in this population, but safety data are mixed. Methods This retrospective cohort study included patients with IBD ≥ 18 years of age from Optum's de‐identified ...
Adam S. Mayer +4 more
wiley +1 more source
Transmission of computer data- moveable matter in criminal law [PDF]
Criminal law response to the development of information and communication technology and misuse of public communications service for a long period of time does not follow contemporary models of collection of digital electronic communications services ...
Dražen Škrtić
doaj
Computer network operations and ‘rule-with-law’ in Australia
Computer Network Operations (CNOs) refers to government intrusion and/or interference with networked information communication infrastructures for the purposes of law enforcement and security intelligence.
Adam Molnar +2 more
doaj +1 more source
An Economic Assessment of UCITA [PDF]
The Uniform Computer Information Transactions Act (UCITA) is a model contract law developed by the National Conference of Commissioners on Uniform State Laws (NCCUSL).
Hahn, Robert W., Layne-Farrar, Anne
core +1 more source
A Q‐Learning Algorithm to Solve the Two‐Player Zero‐Sum Game Problem for Nonlinear Systems
A Q‐learning algorithm to solve the two‐player zero‐sum game problem for nonlinear systems. ABSTRACT This paper deals with the two‐player zero‐sum game problem, which is a bounded L2$$ {L}_2 $$‐gain robust control problem. Finding an analytical solution to the complex Hamilton‐Jacobi‐Issacs (HJI) equation is a challenging task.
Afreen Islam +2 more
wiley +1 more source
Novelties in Russian criminal law on liability for personal data breaches
This article presents the results of the first critical legal analysis of a novel provision in Russian criminal law that penalizes anyone who engages in the illegal use, transfer, collection, or storage of computer information containing personal data ...
A. A. Shutova
doaj +1 more source
Sharing knowledge without sharing data: on the false choice between the privacy and utility of information [PDF]
Presentation slides for Azer Bestavros' June 1, 2017 talk at the BU Law School.As part of an ongoing collaboration, the Law School hosted a talk by Azer Bestavros, BU Professor of Computer Science and the Director of the Hariri Institute for Computing ...
Bestavros, Azer
core

