Results 41 to 50 of about 747,487 (289)

Differentially Private Regression for Discrete-Time Survival Analysis

open access: yes, 2017
In survival analysis, regression models are used to understand the effects of explanatory variables (e.g., age, sex, weight, etc.) to the survival probability.
Hui, Siu Cheung, Nguyên, Thông T.
core   +1 more source

Revisiting Mission‐Oriented Cancer Research to tackle the increasing burden of cancer in Europe–a policy perspective

open access: yesMolecular Oncology, EarlyView.
Translational cancer research and its implementation through competitively selected Comprehensive Cancer Centers across Europe should be the primary policy focus for addressing the increasing cancer burden in Europe and counteract the present main strategy to convert cancer to a chronic disease.
Manuel Heitor   +2 more
wiley   +1 more source

A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services

open access: yesSensors, 2022
As smart devices and mobile positioning technologies improve, location-based services (LBS) have grown in popularity. The LBS environment provides considerable convenience to users, but it also poses a significant threat to their privacy.
Shiwen Zhang   +4 more
doaj   +1 more source

Sharing, privacy and trust issues for photo collections [PDF]

open access: yes, 2007
Digital libraries are quickly being adopted by the masses. Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible collections.
Adams, Anne   +2 more
core   +1 more source

Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions [PDF]

open access: yes, 2017
The Internet of Things (IoT) ability to monitor our every move raises many privacy concerns. This paper reports on a study to assess current awareness of privacy implications of IoT devices amongst Saudi Arabians.
Aleisa, Noura, Renaud, Karen
core   +2 more sources

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

Semantic and Trade-Off Aware Location Privacy Protection in Road Networks Via Improved Multi-Objective Particle Swarm Optimization

open access: yesIEEE Access, 2021
Location privacy protection is an essential but challenging topic in the field of network security. Although the existing research methods, such as ${k}$ -anonymity, mix zone, and differential privacy, show significant success, they usually neglect the ...
Cenxi Tian   +4 more
doaj   +1 more source

Machine-Readable Privacy Certificates for Services [PDF]

open access: yes, 2013
Privacy-aware processing of personal data on the web of services requires managing a number of issues arising both from the technical and the legal domain.
A. Cavoukian   +13 more
core   +1 more source

Lipopolysaccharide uptake is augmented in lipopolysaccharide‐tolerant mouse macrophage‐like cells via increased CD14 expression

open access: yesFEBS Open Bio, EarlyView.
In normal (nontolerant) cells, CD14 is crucial for both LPS uptake and LPS signaling. In LPS‐tolerant cells, in which LPS‐induced TNF‐α and IFN‐β production is suppressed, there is a dramatic increase in surface CD14 expression. The overexpressed CD14 in LPS‐tolerant cells is responsible for the enhanced LPS uptake without inducing pro‐inflammatory ...
Saeka Nishihara   +3 more
wiley   +1 more source

Review on video privacy protection

open access: yesTongxin xuebao, 2013
With the rapid development of the Internet and the tremendous proliferation of video applications,video privacy protection has garnered significant attention nowadays.It is a key problem to protect privacy while ensuring normal application.A survey of ...
Ling-ling TONG   +2 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy