Results 51 to 60 of about 30,805,646 (334)
Overlay Protection Against Link Failures Using Network Coding [PDF]
This paper introduces a network coding-based protection scheme against single and multiple link failures. The proposed strategy ensures that in a connection, each node receives two copies of the same data unit: one copy on the working circuit, and a ...
Kamal, Ahmed +5 more
core +5 more sources
Synthetic data protection: Towards a paradigm change in data regulation?
Synthetic data generated through machine learning algorithms from original real-world data is gaining prominence across sectors due to their potential to provide privacy-preserving alternatives to traditional data sources.
A. Beduschi
semanticscholar +1 more source
Nuclear factor Y (NF-Y) gene family is an important transcription factor composed of three subfamilies of NF-YA, NF-YB and NF-YC, which is involved in plant growth, development and stress response.
Yue Tian +6 more
doaj +1 more source
Revisiting interval protection, a.k.a. partial cell suppression, for tabular data [PDF]
The final publication is available at link.springer.comInterval protection or partial cell suppression was introduced in “M. Fischetti, J.-J. Salazar, Partial cell suppression: A new methodology for statistical disclosure control, Statistics and ...
Castro Pérez, Jordi +1 more
core +1 more source
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie +4 more
wiley +1 more source
Towards Data Protection Compliance [PDF]
Privacy and data protection are fundamental issues nowadays for every organization. This paper calls for the development of methods, techniques and infrastructure to allow the deployment of privacy-aware IT systems, in which humans are integral part of ...
Etalle, Sandro +2 more
core +2 more sources
Homomorphic Data Isolation for Hardware Trojan Protection
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr +4 more
core +1 more source
Data breaches result in data loss, including personal, health, and financial information that are crucial, sensitive, and private. The breach is a security incident in which personal and sensitive data are exposed to unauthorized individuals, with the ...
Gabriel Arquelau Pimenta Rodrigues +7 more
semanticscholar +1 more source
Clinical Insights Into Hypercalcemia of Malignancy in Childhood
ABSTRACT Hypercalcemia of malignancy (HCM) is a rare but life‐threatening metabolic emergency in children that occurs in less than 1% of pediatric cancer cases, with a reported incidence ranging from 0.4% to 1.0% across different studies. While it is observed in 10%–20% of adult malignancies, pediatric HCM remains relatively uncommon.
Hüseyin Anıl Korkmaz
wiley +1 more source
Exploring data protection challenges of automated driving
With the increase in automation of vehicles and the rise of driver monitoring systems in those vehicles, data protection becomes more relevant for the automotive sector.
T. Mulder, N. Vellinga
semanticscholar +1 more source

