Results 71 to 80 of about 126,150 (308)

From usability to secure computing and back again [PDF]

open access: yes, 2019
Secure multi-party computation (MPC) allows multiple parties to jointly compute the output of a function while preserving the privacy of any individual party’s inputs to that function. As MPC protocols transition from research prototypes to realworld
Albab, Kinan Dak   +7 more
core   +1 more source

Impact of Positive Lifestyle Behaviors on Direct Health Care Cost Savings for Low Back Pain

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to investigate the relationship between a previously purpose‐developed lifestyle behavior scale and health care cost savings related to low back pain (LBP). Methods This longitudinal study used data from the Australian Twin Back (AUTBACK) study. LBP and lifestyle behavior measures were collected at baseline. Physical activity
Ye Tian   +8 more
wiley   +1 more source

Secret charing vs. encryption-based techniques for privacy preserving data mining [PDF]

open access: yes, 2007
Privacy preserving querying and data publishing has been studied in the context of statistical databases and statistical disclosure control. Recently, large-scale data collection and integration efforts increased privacy concerns which motivated data ...
Pedersen, Thomas Brochmann   +4 more
core  

Secure and Energy-Efficient Data Aggregation in Wireless Sensor Networks

open access: yes, 2012
Data aggregation in intermediate nodes (called aggregator nodes) is an effective approach for optimizing consumption of scarce resources like bandwidth and energy in Wireless Sensor Networks (WSNs).
Sen, Jaydip
core   +1 more source

Clinical Practice Guideline for Evaluation and Management of Peripheral Nervous System Manifestations in Sjögren's Disease

open access: yesArthritis Care &Research, Accepted Article.
Objectives Sjögren's disease is an autoimmune disorder that can impact multiple organ systems, including the peripheral nervous system (PNS). PNS manifestations, which can exist concurrently, include mononeuropathies, polyneuropathies, and autonomic nervous system neuropathies. To help patients and providers in the decision‐making process, we developed
Anahita Deboo   +19 more
wiley   +1 more source

Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey

open access: yesSensors, 2010
Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node.
Rabindra Bista, Jae-Woo Chang
doaj   +1 more source

Privacy-Preserving Shortest Path Computation

open access: yes, 2016
Navigation is one of the most popular cloud computing services. But in virtually all cloud-based navigation systems, the client must reveal her location and destination to the cloud service provider in order to learn the fastest route.
Mitchell, John C.   +3 more
core   +1 more source

Hopfield Neural Networks for Online Constrained Parameter Estimation With Time‐Varying Dynamics and Disturbances

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
This paper proposes two projector‐based Hopfield neural network (HNN) estimators for online, constrained parameter estimation under time‐varying data, additive disturbances, and slowly drifting physical parameters. The first is a constraint‐aware HNN that enforces linear equalities and inequalities (via slack neurons) and continuously tracks the ...
Miguel Pedro Silva
wiley   +1 more source

Research on privacy preserving mechanism of attribute-based encryption cloud storage

open access: yes网络与信息安全学报, 2016
The typical cloud storage architecture was presented as research objects and the privacy preserving mechanism of attribute-based encryption cloud storage including following aspects-data owner,cloud servers,au-thorized agency,data user and revocation of ...
Tao FENG, Xiao-yu YIN
doaj   +3 more sources

A privacy-preserving sharing method of electricity usage using self-organizing map

open access: yesICT Express, 2018
Smart meters for measuring electricity usage are expected in electricity usage management. Although the relevant power supplier stores the measured data, the data are worth sharing among power suppliers because the entire data of a city will be required ...
Yuichi Nakamura   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy