Results 51 to 60 of about 3,780,326 (325)

Successive Trajectory Privacy Protection with Semantics Prediction Differential Privacy

open access: yesEntropy, 2022
The publication of trajectory data provides critical information for various location-based services, and it is critical to publish trajectory data safely while ensuring its availability.
Jing Zhang   +4 more
doaj   +1 more source

Recommending Location Privacy Preferences in Ubiquitous Computing [PDF]

open access: yes, 2014
Location-Based Services have become increasingly popular due to the prevalence of smart devices. The protection of users’ location privacy in such systems is a vital issue.
Henderson, Tristan   +2 more
core  

Health‐Related Quality of Life and Symptom Severity Among Patients With PIK3CA‐Related Overgrowth Spectrum: A Mixed‐Methods Study to Understand Real‐World Experience With Alpelisib Treatment

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background PIK3CA‐related overgrowth spectrum (PROS) includes several rare overgrowth disorders resulting from somatic gain‐of‐function mutations in PIK3CA. Despite treatment advances, including the recent approval of alpelisib for PROS in the United States, literature detailing the patient experience with PROS is limited.
Vamsi Bollu   +8 more
wiley   +1 more source

Rethinking Location Privacy for Unknown Mobility Behaviors

open access: yes, 2019
Location Privacy-Preserving Mechanisms (LPPMs) in the literature largely consider that users' data available for training wholly characterizes their mobility patterns.
Oya, Simon   +2 more
core   +1 more source

Optimal Geo-Indistinguishable Mechanisms for Location Privacy [PDF]

open access: yes, 2014
We consider the geo-indistinguishability approach to location privacy, and the trade-off with respect to utility. We show that, given a desired degree of geo-indistinguishability, it is possible to construct a mechanism that minimizes the service quality
Chatzikokolakis K.   +6 more
core   +4 more sources

On the Privacy Implications of Location Semantics [PDF]

open access: yesProceedings on Privacy Enhancing Technologies, 2016
Abstract Mobile users increasingly make use of location-based online services enabled by localization systems. Not only do they share their locations to obtain contextual services in return (e.g., ‘nearest restaurant’), but they also share, with their friends, information about the venues (e.g., the type, such as a restaurant or a ...
Ağir, Berker   +3 more
openaire   +2 more sources

‘They Need to Hear You Say It’: Healthcare Professionals’ Perspectives on Barriers and Enablers to End‐of‐Life Discussions With Adolescents and Young Adults With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT End‐of‐life conversations with adolescents and young adults (AYAs) with cancer rarely occur without the guidance of healthcare professionals. As a part of the ‘Difficult Discussions’ study, focused on palliative care and advance care planning discussions with AYAs with cancer, we investigated the factors that healthcare professionals identify ...
Justine Lee   +9 more
wiley   +1 more source

Dummy Generation Based on User-Movement Estimation for Location Privacy Protection

open access: yesIEEE Access, 2018
Location-based services (LBSs) have been becoming more common due to the prevalence of GPS-enabled devices. While LBSs bring many benefits for our daily lives, location information may reveal private information, rendering an important problem of ...
Shuhei Hayashida   +3 more
doaj   +1 more source

Privacy-preserving location-based traffic density monitoring

open access: yesConnection Science, 2022
Traffic density monitoring is an important method to predict road traffic conditions, which can bring some convenience to people's travel in daily life.
Lei Wu   +4 more
doaj   +1 more source

Economic location-based services, privacy and the relationship to identity [PDF]

open access: yes, 2005
Mobile telephony and mobile internet are driving a new application paradigm: location-based services (LBS). Based on a person’s location and context, personalized applications can be deployed.
Fritsch, Lothar
core  

Home - About - Disclaimer - Privacy