Results 51 to 60 of about 47,575 (276)
(α, k)-anonymous data publishing [PDF]
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymity model has been introduced for protecting individual identification. Recent studies show that a more sophisticated model is necessary to protect the association of individuals to sensitive information.
Raymond Wong +3 more
openaire +2 more sources
z-anonymity: Zero-Delay Anonymization for Data Streams [PDF]
With the advent of big data and the birth of the data markets that sell personal information, individuals' privacy is of utmost importance. The classical response is anonymization, i.e., sanitizing the information that can directly or indirectly allow users' re-identification. The most popular solution in the literature is the k-anonymity.
Jha, Nikhil +4 more
openaire +3 more sources
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen +11 more
wiley +1 more source
BUDAMAF: Data Management in Cloud Federations
Data management has always been a multi-domain problem even in the simplest cases. It involves, quality of service, security, resource management, cost management, incident identification, disaster avoidance and/or recovery, as well as many other ...
Anagnostopoulos, Dimosthenis +3 more
core +1 more source
Somatic mutational landscape in von Hippel–Lindau familial hemangioblastoma
The causes of central nervous system (CNS) hemangioblastoma in Von Hippel–Lindau (vHL) disease are unclear. We used Whole Exome Sequencing (WES) on familial hemangioblastoma to investigate events that underlie tumor development. Our findings suggest that VHL loss creates a permissive environment for tumor formation, while additional alterations ...
Maja Dembic +5 more
wiley +1 more source
Asymptotic Loss in Privacy due to Dependency in Gaussian Traces
The rapid growth of the Internet of Things (IoT) necessitates employing privacy-preserving techniques to protect users' sensitive information. Even when user traces are anonymized, statistical matching can be employed to infer sensitive information.
Goeckel, Dennis L. +4 more
core +1 more source
Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz +3 more
wiley +1 more source
Effects of Biological Sex and Age on Cerebrospinal Fluid Markers—A Retrospective Observational Study
ABSTRACT Objective Cerebrospinal fluid (CSF) analysis is a key diagnostic tool for neurological diseases. To date, only a few studies have investigated in larger cohorts the effect of age and biological sex on diagnostic markers extracted from CSF. Methods For this retrospective observational study, 4163 CSF findings (2012–2020) were evaluated.
Isabel‐Sophie Hafer +3 more
wiley +1 more source
ABSTRACT Background SOX1 antibody‐positive paraneoplastic neurological syndromes (PNS) exhibit significant population‐specific clinical heterogeneity. While Western cohorts predominantly manifest Lambert‐Eaton myasthenic syndrome (65%–80%), comprehensive clinical characterization and treatment response data in Asian populations remain critically ...
Jin‐Long Ye +11 more
wiley +1 more source
Mathematics, risk, and messy survey data
Research funder mandates, such as those from the U.S. National Science Foundation (2011), the Canadian Tri-Agency (draft, 2018), and the UK Economic and Social Research Council (2018) now often include requirements for data curation, including where ...
Kristi Anne Thompson, Carolyn Sullivan
doaj +1 more source

