Results 101 to 110 of about 667,722 (335)

"We are a startup to the core": A qualitative interview study on the security and privacy development practices in Turkish software startups [PDF]

open access: yesarXiv, 2022
Security and privacy are often neglected in software development, and rarely a priority for developers. This insight is commonly based on research conducted by researchers and on developer populations living and working in the United States, Europe, and the United Kingdom.
arxiv  

Hardware security for software privacy support

open access: yesElectronics Letters, 1999
The security level in existing workstation and server systems is not sufficient for most applications in a network environment. The processors only provide basic multitasking support, and any other security enforcement has to be carried out in the software layers.
Tanguy Gilmont   +2 more
openaire   +2 more sources

Privacy-preserving Cross-domain Routing Optimization -- A Cryptographic Approach [PDF]

open access: yes, 2015
Today's large-scale enterprise networks, data center networks, and wide area networks can be decomposed into multiple administrative or geographical domains. Domains may be owned by different administrative units or organizations. Hence protecting domain
Chen, Qingjun, Qian, Chen, Zhong, Sheng
core  

Clinical and Imaging Features of Sporadic and Genetic Frontotemporal Lobar Degeneration TDP‐43 A and B

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Certain frontotemporal lobar degeneration subtypes, including TDP‐A and B, can either occur sporadically or in association with specific genetic mutations. It is uncertain whether syndromic or imaging features previously associated with these patient groups are subtype or genotype specific.
Sean Coulborn   +17 more
wiley   +1 more source

differential privacy for coverage analysis of software traces

open access: yes, 2021
This work considers software execution traces, where a trace is a sequence of run-time events. Each user of a software system collects the set of traces covered by her execution of the software, and reports this set to an analysis server. Our goal is to report the local data of each user in a privacy-preserving manner by employing local differential ...
Hao, Yu   +4 more
openaire   +4 more sources

Clinical Trial Readiness in Limb Girdle Muscular Dystrophy R1 (LGMDR1): A GRASP Consortium Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Identifying functional measures that are both valid and reliable in the limb girdle muscular dystrophy (LGMD) population is critical for quantifying the level of functional impairment related to disease progression in order to establish clinical trial readiness in the context of anticipated therapeutic trials.
Stephanie M. Hunn   +29 more
wiley   +1 more source

Internet Privacy and Self-Regulation: Lessons from the Porn Wars [PDF]

open access: yes, 2001
The availability and adequacy of technical remedies ought to play a crucial role in evaluating the propriety of state action with regard to both the inhibition of Internet pornography and the promotion of Internet privacy.
Tom W. Bell
core  

Retaining Expression on De-identified Faces [PDF]

open access: yes, 2017
© Springer International Publishing AG 2017The extensive use of video surveillance along with advances in face recognition has ignited concerns about the privacy of the people identifiable in the recorded documents.
AK Ho   +18 more
core   +2 more sources

OpenFL-XAI: Federated learning of explainable artificial intelligence models in Python

open access: yesSoftwareX, 2023
Artificial Intelligence (AI) systems play a significant role in manifold decision-making processes in our daily lives, making trustworthiness of AI more and more crucial for its widespread acceptance.
Mattia Daole   +5 more
doaj  

Home - About - Disclaimer - Privacy