Results 101 to 110 of about 26,049,904 (376)
Security and Privacy of Customer Data as an Element Creating the Image of the Company [PDF]
Justyna Żywiołek +3 more
openalex +1 more source
Going Rogue: Mobile Research Applications and the Right to Privacy [PDF]
This Article investigates whether nonsectoral state laws may serve as a viable source of privacy and security standards for mobile health research participants and other health data subjects until new federal laws are created or enforced.
Tovino, Stacey A.
core +2 more sources
Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues
With the explosive growth of Internet of Things devices and massive data produced at the edge of the network, the traditional centralized cloud computing model has come to a bottleneck due to the bandwidth limitation and resources constraint.
Jiale Zhang +4 more
semanticscholar +1 more source
Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz +3 more
wiley +1 more source
A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data [PDF]
Weiwei Lin +4 more
openalex +1 more source
Objective This study aimed to evaluate the impact of a series of policies that mandated switching patients with inflammatory arthritis (IA) from an originator biologic to a biosimilar in British Columbia, Canada, on health care resource use and cost.
HaoHung Dang +4 more
wiley +1 more source
Enterprise Resource Planning (ERP) integrates all business processes in the organization. Therefore, data security is the main point of security in ERP systems. Most of the biggest ERP developers have already implemented specialized hardware and software
Radoslav Hrischev
semanticscholar +1 more source
Objective Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centered care and informing local service pathways and care guidelines or standards.
Sonia Ranelli +8 more
wiley +1 more source
An improved face attributes editing method based on DDIM
The main advantage of DDIM is that it guarantees the quality of the generated images while increasing the efficiency of the generation by modifying the sampling strategy in the diffusion process.
Libo He +6 more
doaj +1 more source
Analysis of AES, SKINNY, and Others with Constraint Programming
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems.
Siwei Sun +6 more
doaj +1 more source

