Results 51 to 60 of about 30,805,646 (334)

Overlay Protection Against Link Failures Using Network Coding [PDF]

open access: yes, 2010
This paper introduces a network coding-based protection scheme against single and multiple link failures. The proposed strategy ensures that in a connection, each node receives two copies of the same data unit: one copy on the working circuit, and a ...
Kamal, Ahmed   +5 more
core   +5 more sources

Synthetic data protection: Towards a paradigm change in data regulation?

open access: yesBig Data & Society
Synthetic data generated through machine learning algorithms from original real-world data is gaining prominence across sectors due to their potential to provide privacy-preserving alternatives to traditional data sources.
A. Beduschi
semanticscholar   +1 more source

Genome-wide identification and expression analysis of NF-Y gene family in tobacco (Nicotiana tabacum L.)

open access: yesScientific Reports
Nuclear factor Y (NF-Y) gene family is an important transcription factor composed of three subfamilies of NF-YA, NF-YB and NF-YC, which is involved in plant growth, development and stress response.
Yue Tian   +6 more
doaj   +1 more source

Revisiting interval protection, a.k.a. partial cell suppression, for tabular data [PDF]

open access: yes, 2016
The final publication is available at link.springer.comInterval protection or partial cell suppression was introduced in “M. Fischetti, J.-J. Salazar, Partial cell suppression: A new methodology for statistical disclosure control, Statistics and ...
Castro Pérez, Jordi   +1 more
core   +1 more source

Why and When Are Evidence‐Based Interventions Adopted in Paediatric Supportive Care? A Qualitative Exploration of the Determinants of Photobiomodulation Implementation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie   +4 more
wiley   +1 more source

Towards Data Protection Compliance [PDF]

open access: yes, 2010
Privacy and data protection are fundamental issues nowadays for every organization. This paper calls for the development of methods, techniques and infrastructure to allow the deployment of privacy-aware IT systems, in which humans are integral part of ...
Etalle, Sandro   +2 more
core   +2 more sources

Homomorphic Data Isolation for Hardware Trojan Protection

open access: yes, 2015
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr   +4 more
core   +1 more source

Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review

open access: yesInternational Conference on Data Technologies and Applications
Data breaches result in data loss, including personal, health, and financial information that are crucial, sensitive, and private. The breach is a security incident in which personal and sensitive data are exposed to unauthorized individuals, with the ...
Gabriel Arquelau Pimenta Rodrigues   +7 more
semanticscholar   +1 more source

Clinical Insights Into Hypercalcemia of Malignancy in Childhood

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Hypercalcemia of malignancy (HCM) is a rare but life‐threatening metabolic emergency in children that occurs in less than 1% of pediatric cancer cases, with a reported incidence ranging from 0.4% to 1.0% across different studies. While it is observed in 10%–20% of adult malignancies, pediatric HCM remains relatively uncommon.
Hüseyin Anıl Korkmaz
wiley   +1 more source

Exploring data protection challenges of automated driving

open access: yesComputer Law and Security Review, 2021
With the increase in automation of vehicles and the rise of driver monitoring systems in those vehicles, data protection becomes more relevant for the automotive sector.
T. Mulder, N. Vellinga
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy