Results 81 to 90 of about 12,445,360 (313)

On the Anonymization of Differentially Private Location Obfuscation

open access: yes, 2018
Obfuscation techniques in location-based services (LBSs) have been shown useful to hide the concrete locations of service users, whereas they do not necessarily provide the anonymity.
duchi, montazeri, yang
core   +1 more source

Efficient location privacy-aware forwarding in opportunistic mobile networks [PDF]

open access: yes, 2014
This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to protect users’ location information and ensure better privacy while forwarding queries/replies to/from untrusted location-based service (LBS) over ...
Benslimane, Abderrahim   +2 more
core   +2 more sources

Effect of Foot Orthoses on Midfoot Pain and the Volume of Bone Marrow Lesions in the Midfoot: A Randomized Mechanism of Action Study

open access: yesArthritis Care &Research, EarlyView.
Objective Foot orthoses are thought to improve pain by potentially modifying internal mechanical forces. To test this, we explored whether foot orthoses can modify patterns of bone marrow lesions (BMLs) in people with midfoot pain. Methods Forty‐two people were recruited with midfoot pain, and magnetic resonance imaging–confirmed midfoot BMLs ...
Jill Halstead   +4 more
wiley   +1 more source

The Role of Quasi-identifiers in k-Anonymity Revisited [PDF]

open access: yes, 2006
The concept of k-anonymity, used in the recent literature to formally evaluate the privacy preservation of published tables, was introduced based on the notion of quasi-identifiers (or QI for short).
Bettini, Claudio   +2 more
core   +1 more source

Quantifying Privacy: A Novel Entropy-Based Measure of Disclosure Risk

open access: yes, 2014
It is well recognised that data mining and statistical analysis pose a serious treat to privacy. This is true for financial, medical, criminal and marketing research.
A Oganian   +34 more
core   +1 more source

Publishing Microdata with a Robust Privacy Guarantee [PDF]

open access: yes, 2012
Today, the publication of microdata poses a privacy threat. Vast research has striven to define the privacy condition that microdata should satisfy before it is released, and devise algorithms to anonymize the data so as to achieve this condition.
Cao, Jianneng, Karras, Panagiotis
core   +2 more sources

Clinical Practice Guideline for Evaluation and Management of Peripheral Nervous System Manifestations in Sjögren's Disease

open access: yesArthritis Care &Research, EarlyView.
Objective Sjögren's disease is an autoimmune disorder that can impact multiple organ systems, including the peripheral nervous system (PNS). PNS manifestations, which can exist concurrently, include mononeuropathies, polyneuropathies, and autonomic nervous system neuropathies.
Anahita Deboo   +88 more
wiley   +1 more source

Diagnostic Use of Testing for Novel Murine Autoantibodies for Sjögren Disease in the Rheumatology Outpatient Setting

open access: yesArthritis Care &Research, EarlyView.
Objective The goal was to assess the diagnostic performance of three novel autoantibodies (NA) for Sjögren disease (SjD) by comparing NA prevalence in patients with SjD, other autoimmune rheumatic diseases (ARDs), nonspecific chronic sialadenitis (CS), and controls.
Chadwick R. Johr   +5 more
wiley   +1 more source

A Robust Adaptive One‐Sample‐Ahead Preview Super‐Twisting Sliding Mode Controller

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
Block Diagram of the Robust Adaptive One‐Sample‐Ahead Preview Super‐Twisting Sliding Mode Controller. ABSTRACT This article introduces a discrete‐time robust adaptive one‐sample‐ahead preview super‐twisting sliding mode controller. A stability analysis of the controller by Lyapunov criteria is developed to demonstrate its robustness in handling both ...
Guilherme Vieira Hollweg   +5 more
wiley   +1 more source

A look ahead approach to secure multi-party protocols [PDF]

open access: yes, 2009
Secure multi-party protocols have been proposed to enable non-colluding parties to cooperate without a trusted server. Even though such protocols prevent information disclosure other than the objective function, they are quite costly in computation and ...
Nergiz, Mehmet Ercan   +2 more
core  

Home - About - Disclaimer - Privacy