Results 51 to 60 of about 1,511,062 (337)
A Profile of Data Preservation Activities in University Data Libraries and Archives
A Profile of Data Preservation Activities in University Data Libraries and ...
Alice Robbin
doaj +1 more source
Privacy-Preserving Big Data Security for IoT With Federated Learning and Cryptography
In the ever-expanding Internet of Things (IoT) domain, the production of data has reached an unparalleled scale. This massive data is processed to glean invaluable insights, accelerating a myriad of decision-making processes.
Kamran Ahmad Awan +3 more
doaj +1 more source
From Preserving Data to Preserving Research: Curation of Process and Context [PDF]
In the domain of eScience, investigations are increasingly collaborative. Most scientific and engineering domains benefit from building on top of the outputs of other research: By sharing information to reason over and data to incorporate in the modelling task at hand.
Mayer R. +4 more
openaire +1 more source
ABSTRACT Bone tumours present significant challenges for affected patients, as multimodal therapy often leads to prolonged physical limitations. This is particularly critical during childhood and adolescence, as it can negatively impact physiological development and psychosocial resilience.
Jennifer Queisser +5 more
wiley +1 more source
Cloud computing provides a ubiquitous data storage and access mechanism for organizations, industries, and smart grids to facilitate their operations. However, the concern in cloud storage systems is to secure data access control toward authentication ...
Ahmed Abdu Alattab +3 more
doaj +1 more source
Towards a framework for predicting whole life-cycle cost for long-term digital preservation [PDF]
Estimating the costs for the whole lifecycle of long-term digital preservation (LTDP) activities ena-bles decision makers to choose carefully what data to preserve, duration of preservation and type of preservation techniques best applied for their ...
Badawy, Mohamed +3 more
core
Enteropathogenic E. coli (EPEC) infects the human intestinal epithelium, resulting in severe illness and diarrhoea. In this study, we compared the infection of cancer‐derived cell lines with human organoid‐derived models of the small intestine. We observed a delayed in attachment, inflammation and cell death on primary cells, indicating that host ...
Mastura Neyazi +5 more
wiley +1 more source
Ce que le numérique fait à l’historien.ne. Entretien avec Claire Lemercier
Émilien Ruiz est doctorant en histoire contemporaine à l’École des Hautes Études en Sciences Sociales (EHESS). Sa thèse Trop de fonctionnaires? La question des effectifs de l’État dans la France du XXe siècle porte sur divers aspects de l’évolution du ...
Elisa Grandi est doctorante en histoire contemporaine et histoire de l’Amérique Latine à l’Université Paris Diderot et membre du laboratoire SEDET. Sa thèse Réseaux Sociaux et changement institutionnel. Experts internationaux, médiation politique et reformes économiques en Colombie (1949-1966), sous la direction de Zacarias Moutoukias, porte sur les réseaux reliant les experts de la Banque Mondiale et le personnel local en Colombie lors des premières missions de la Banque dans le pays. Après avoir été Visiting Student à la Duke University et Visiting Scholar à la New School of Social Research, elle est actuellement boursière du Gouvernement français Eiffel-Excellence à l’Université Paris Diderot. Parmi ses publications: «David Lilienthal, la Banca Mondiale e lo sviluppo di una rete transnazionale di economic advising (1950-1957)», Diacronie. Studi di Storia Contemporanea: Storia transnazionale e prospettive transnazionali nell’analisi storica, N. 6, 2|2011 (URL: < http://www.studistorici.com/2011/05/01/grandi_numero_6/ >). +1 more
doaj
The Preservation of Research Data in a Postmodern Culture
The Preservation of Research Data in a Postmodern ...
Chuck Humphrey
doaj +1 more source
Structure preserving anonymization of router configuration data
A repository of router configuration files from production networks would provide the research community with a treasure trove of data about network topologies, routing designs, and security policies. However, configuration files have been largely unobtainable precisely because they provide detailed information that could be exploited by competitors ...
Maltz, D. +6 more
openaire +2 more sources

