Results 11 to 20 of about 1,497,806 (238)
Assessment of verbal interaction in Chinese classroom using social network analysis [PDF]
Background The global growth in Chinese language learners presents systematic challenges to Chinese classroom interaction evaluation. Key limitations include inadequate accuracy in speech recognition and shallow interaction analysis.
Li Zhang +5 more
doaj +2 more sources
The letter to the Editor is in response to the manuscript by Hertzog et al. (2023) titled "Data management instruments to Protect the personal information of Children and Adolescents in sub-Saharan Africa." The letter elaborates on personal data ...
J.H. Smith, JS Horne
doaj +1 more source
Privacy in (mobile) telecommunications services [PDF]
Telecommunications services are for long subject to privacy regulations. At stake are traditionally: privacy of the communication and the protection of traffic data. Privacy of the communication is legally founded.
J Hoven van den +4 more
core +1 more source
New Program Abstractions for Privacy [PDF]
Static program analysis, once seen primarily as a tool for optimising programs, is now increasingly important as a means to provide quality guarantees about programs. One measure of quality is the extent to which programs respect the privacy of user data.
C Dwork +5 more
core +1 more source
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang +4 more
doaj +1 more source
Cryptographic identification protocols enable a prover to prove its identity to a verifier. A subclass of such protocols are shared-secret challenge-response identification protocols in which the prover and the verifier share the same secret and the ...
Asghar Hassan Jameel, Kaafar Mohamed Ali
doaj +1 more source
Régimen Jurídico de la acción de acceso a la información pública en el Uruguay
En este artículo se pretende mostrar la importancia del acceso a la información pública, que es un derecho humano fundamental. El estudio se basa en los pilares fundamentales del derecho y las recientes medidas adoptadas por el Estado.
Pablo Schiavi
doaj +1 more source
Machine-Readable Privacy Certificates for Services [PDF]
Privacy-aware processing of personal data on the web of services requires managing a number of issues arising both from the technical and the legal domain.
A. Cavoukian +13 more
core +1 more source
Quantifying Differential Privacy in Continuous Data Release under Temporal Correlations [PDF]
Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives to continuously release private data for protecting privacy at
Cao, Yang +3 more
core +2 more sources
Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things
The Internet of Things (IoT) is an emerging technology that can benefit from cloud infrastructure. In a cloud-based IoT network, a variety of data is collected by smart devices and transmitted to a cloud server.
Mohammad Ali +2 more
doaj +1 more source

