Results 51 to 60 of about 796,593 (318)
Fred Zacharias’s Skeptical Moralism [PDF]
Fred Zacharias\u27s articles, Rethinking Confidentiality, published in two parts, were a sensational start to an illustrious career. Fred conducted the first and one of the best empirical studies of confidentiality in years, surveying lawyers and clients
Luban, David
core +1 more source
Methods for working with problem residents in medical physics residency education
Abstract Medical physics residency training programs may occasionally encounter residents requiring additional intervention beyond normal training efforts. In the literature, these residents are referred to as “problem” residents. While the physician literature on the subject is valuable, this paper specifically focuses on dealing with a problem ...
Christopher J. Watchman, Dandan Zheng
wiley +1 more source
Measuring Confidentiality Risks in Census Data [PDF]
Two trends have been on a collision course over the recent past. The first is the increasing demand by researchers for greater detail and flexibility in outputs from the decennial Census of Population. The second is the need felt by the Census Offices to
Openshaw, S.+2 more
core +1 more source
Distributed Function Computation with Confidentiality
A set of terminals observe correlated data and seek to compute functions of the data using interactive public communication. At the same time, it is required that the value of a private function of the data remains concealed from an eavesdropper ...
Tyagi, Himanshu
core +1 more source
IoTTPS: Ensemble RKSVM Model-Based Internet of Things Threat Protection System
An Internet of Things (IoT) network is prone to many ways of threatening individuals. IoT sensors are lightweight, lack complicated security protocols, and face threats to privacy and confidentiality.
Urooj Akram+8 more
doaj +1 more source
Composing security protocols: from confidentiality to privacy [PDF]
Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular ...
Arapinis, Myrto+2 more
core +3 more sources
Objective Posttraumatic osteoarthritis (PTOA) accounts for nearly 12% of osteoarthritis incidences and often occurs after anterior cruciate ligament (ACL) tear. Ensuring the uptake of preventive treatments for PTOA requires that investigators and clinicians understand factors influencing patients to seek preventive therapies.
Lily M. Waddell+10 more
wiley +1 more source
National-level data are limited regarding confidentiality-related issues and the use of sexually transmitted disease (STD) services for adolescents and young adults. Changes in the U.S.
J. Leichliter, C. Copen, P. Dittus
semanticscholar +1 more source
This manuscript presents advances in digital transformation within materials science and engineering, emphasizing the role of the MaterialDigital Initiative. By testing and applying concepts such as ontologies, knowledge graphs, and integrated workflows, it promotes semantic interoperability and data‐driven innovation. The article reviews collaborative
Bernd Bayerlein+44 more
wiley +1 more source