Results 101 to 110 of about 703,183 (313)

Software Defined Networking With Pseudonym Systems for Secure Vehicular Clouds

open access: yesIEEE Access, 2016
The vehicular cloud is a promising new paradigm, where vehicular networking and mobile cloud computing are elaborately integrated to enhance the quality of vehicular information services.
Xumin Huang   +5 more
doaj   +1 more source

Predicting Epileptogenic Tubers in Patients With Tuberous Sclerosis Complex Using a Fusion Model Integrating Lesion Network Mapping and Machine Learning

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Accurate localization of epileptogenic tubers (ETs) in patients with tuberous sclerosis complex (TSC) is essential but challenging, as these tubers lack distinct pathological or genetic markers to differentiate them from other cortical tubers.
Tinghong Liu   +11 more
wiley   +1 more source

Development of a Prediction Model for Progression Risk in High‐Grade Gliomas Based on Habitat Radiomics and Pathomics

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To investigate the value of constructing models based on habitat radiomics and pathomics for predicting the risk of progression in high‐grade gliomas. Methods This study conducted a retrospective analysis of preoperative magnetic resonance (MR) images and pathological sections from 72 patients diagnosed with high‐grade gliomas (52 ...
Yuchen Zhu   +14 more
wiley   +1 more source

Study on utility optimization for randomized response mechanism

open access: yesTongxin xuebao, 2019
For the study of privacy-utility trade-off in local differential privacy,the utility optimization models of binary generalized random response mechanism for the case of differential privacy and approximate differential privacy were established.By graphic
Yihui ZHOU, Laifeng LU, Zhenqiang WU
doaj   +2 more sources

Differential Privacy for Coverage Analysis of Software Traces

open access: green, 2021
Yu Hao   +4 more
openalex   +2 more sources

Privacy-Invasive Software in Filesharing Tools [PDF]

open access: yes, 2006
Personal privacy is affected by the occurrence of adware and spyware in peertopeer tools. In an experiment, we investigated five file-sharing tools and found that they all contained ad-/spyware programs, and, that these hidden components communicated with several servers on the Internet.
Andreas Jacobsson   +2 more
openaire   +1 more source

Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing

open access: yesJournal of Applied Mathematics, 2014
Cloud computing has provided services for users as a software paradigm. However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features.
Changbo Ke   +4 more
doaj   +1 more source

Clinical Spectrum and Outcomes of SOX1 Antibody‐Associated Paraneoplastic Neurological Syndromes: A Chinese Cohort Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background SOX1 antibody‐positive paraneoplastic neurological syndromes (PNS) exhibit significant population‐specific clinical heterogeneity. While Western cohorts predominantly manifest Lambert‐Eaton myasthenic syndrome (65%–80%), comprehensive clinical characterization and treatment response data in Asian populations remain critically ...
Jin‐Long Ye   +11 more
wiley   +1 more source

Peeling Back the Student Privacy Pledge [PDF]

open access: yes, 2017
Education software is a multi-billion dollar industry that is rapidly growing. The federal government has encouraged this growth through a series of initiatives that reward schools for tracking and aggregating student data.
Pfeffer-Gillett, Alexi
core   +2 more sources

Home - About - Disclaimer - Privacy