Results 231 to 240 of about 194,648 (280)
Abstract Air separation via selective adsorption using porous adsorbents offers energy‐efficient alternatives to cryogenic distillation for producing high‐purity O2 and N2. Adsorbent efficacy depends on balancing selectivity, durability, and performance consistency across varying conditions. This comprehensive review critically discusses the design and
Tianqi Wang +9 more
wiley +1 more source
A multimodal fusion pipeline predicts high‐resolution ion distributions in imaging mass spectrometry by integrating Fourier transform ion cyclotron resonance, time‐of‐flight matrix‐assisted laser desorption/ionization, and time‐of‐flight secondary ion mass spectrometry data.
Md Inzamam Ul Haque +7 more
wiley +1 more source
Combining machine learning and probabilistic statistical learning is a powerful way to discover and design new materials. A variety of machine learning approaches can be used to identify promising candidates for target applications, and causal inference can help identify potential ways to make them a reality.
Jonathan Y. C. Ting, Amanda S. Barnard
wiley +1 more source
Large language models are transforming microbiome research by enabling advanced sequence profiling, functional prediction, and association mining across complex datasets. They automate microbial classification and disease‐state recognition, improving cross‐study integration and clinical diagnostics.
Jieqi Xing +4 more
wiley +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
SSRN Electronic Journal, 2023
A signal is privacy‐preserving with respect to a collection of privacy sets if the posterior probability assigned to every privacy set remains unchanged conditional on any signal realization. We characterize the privacy‐preserving signals for arbitrary state space and arbitrary privacy sets.
Strack, Philipp, Yang, Kai Hao
openaire +2 more sources
A signal is privacy‐preserving with respect to a collection of privacy sets if the posterior probability assigned to every privacy set remains unchanged conditional on any signal realization. We characterize the privacy‐preserving signals for arbitrary state space and arbitrary privacy sets.
Strack, Philipp, Yang, Kai Hao
openaire +2 more sources
Privacy-Preserving Database Fingerprinting
Proceedings 2023 Network and Distributed System Security Symposium, 2023When sharing relational databases with other parties, in addition to providing high quality (utility) database to the recipients, a database owner also aims to have (i) privacy guarantees for the data entries and (ii) liability guarantees (via fingerprinting) in case of unauthorized redistribution.
Tianxi, Ji +4 more
openaire +2 more sources
Data Mining and Knowledge Discovery, 2007
We describe two algorithms, BiBoost (Bipartite Boosting) and MultBoost (Multiparty Boosting), that allow two or more participants to construct a boosting classifier without explicitly sharing their data sets. We analyze both the computational and the security aspects of the algorithms.
Gambs, Sebastien +2 more
openaire +2 more sources
We describe two algorithms, BiBoost (Bipartite Boosting) and MultBoost (Multiparty Boosting), that allow two or more participants to construct a boosting classifier without explicitly sharing their data sets. We analyze both the computational and the security aspects of the algorithms.
Gambs, Sebastien +2 more
openaire +2 more sources
Privacy-preserving Cooperative Positioning
ION GNSS+, The International Technical Meeting of the Satellite Division of The Institute of Navigation, 2020We address the issue of user privacy in the context of “collaborative” positioning, wherein information is passed between and processed by multiple cooperative agents with the goal of achieving high levels of positioning accuracy. In particular, we evaluate the feasibility of applying a layer of encryption to a linear least squares (LS) algorithm for ...
Hernandez, Guillermo +2 more
openaire +1 more source
Privacy-Preserving Trust Negotiations
2005Trust negotiation is a promising approach for establishing trust in open systems, where sensitive interactions may often occur between entities with no prior knowledge of each other. Although several proposals today exist of systems for the management of trust negotiations none of them addresses in a comprehensive way the problem of privacy ...
ELISA BERTINO +2 more
openaire +2 more sources

