Results 61 to 70 of about 675,521 (280)
Implanting Life-Cycle Privacy Policies in a Context Database [PDF]
Ambient intelligence (AmI) environments continuously monitor surrounding individuals' context (e.g., location, activity, etc.) to make existing applications smarter, i.e., make decision without requiring user interaction.
Anciaux, Nicolas +3 more
core +2 more sources
POSTER: Privacy-preserving Indoor Localization
Upcoming WiFi-based localization systems for indoor environments face a conflict of privacy interests: Server-side localization violates location privacy of the users, while localization on the user's device forces the localization provider to disclose ...
Henze, Martin +3 more
core +1 more source
Network Localization of Fatigue in Multiple Sclerosis
ABSTRACT Background Fatigue is among the most common symptoms and one of the main factors determining the quality of life in multiple sclerosis (MS). However, the neurobiological mechanisms underlying fatigue are not fully understood. Here we studied lesion locations and their connections in individuals with MS, aiming to identify brain networks ...
Olli Likitalo +12 more
wiley +1 more source
Context-aware Location Privacy Protection Method
Location privacy protection has drawn increasing attention with the popularity of location-based services. This study proposes a context-aware location privacy protection method (CA-LP).
Haohua Qing +2 more
doaj +1 more source
Privacy Issues of the W3C Geolocation API [PDF]
The W3C's Geolocation API may rapidly standardize the transmission of location information on the Web, but, in dealing with such sensitive information, it also raises serious privacy concerns.
Doty, Nick +2 more
core +2 more sources
ABSTRACT Objective Accurate localization of epileptogenic tubers (ETs) in patients with tuberous sclerosis complex (TSC) is essential but challenging, as these tubers lack distinct pathological or genetic markers to differentiate them from other cortical tubers.
Tinghong Liu +11 more
wiley +1 more source
A secure and private RFID authentication protocol based on quadratic residue [PDF]
Radio Frequency IDentification based systems are getting pervasively deployed in many real-life applications in various settings for identification and authentication of remote objects.
Kardaş, Süleyman +3 more
core
Towards location privacy awareness on geo-social networks [PDF]
With the current trend of embedding location services within social networks, an ever growing amount of users' spatiotemporal tracks are being collected and used to generate user profiles.
Abdelmoty, Alia, Alrayes, Fatma
core +2 more sources
ABSTRACT Objective Status epilepticus (SE) is associated with significant mortality. Sleep architecture may reflect normal brain function. Impaired sleep architecture is associated with poorer outcomes in numerous conditions. Here we investigate the association of sleep architecture in continuous EEG (cEEG) with survival in SE.
Ran R. Liu +5 more
wiley +1 more source
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick +14 more
wiley +1 more source

