Results 101 to 110 of about 703,183 (313)
Mobile app privacy in software engineering research: A systematic mapping study [PDF]
Fahimeh Ebrahimi +2 more
openalex +1 more source
Software Defined Networking With Pseudonym Systems for Secure Vehicular Clouds
The vehicular cloud is a promising new paradigm, where vehicular networking and mobile cloud computing are elaborately integrated to enhance the quality of vehicular information services.
Xumin Huang +5 more
doaj +1 more source
ABSTRACT Objective Accurate localization of epileptogenic tubers (ETs) in patients with tuberous sclerosis complex (TSC) is essential but challenging, as these tubers lack distinct pathological or genetic markers to differentiate them from other cortical tubers.
Tinghong Liu +11 more
wiley +1 more source
ABSTRACT Objective To investigate the value of constructing models based on habitat radiomics and pathomics for predicting the risk of progression in high‐grade gliomas. Methods This study conducted a retrospective analysis of preoperative magnetic resonance (MR) images and pathological sections from 72 patients diagnosed with high‐grade gliomas (52 ...
Yuchen Zhu +14 more
wiley +1 more source
Study on utility optimization for randomized response mechanism
For the study of privacy-utility trade-off in local differential privacy,the utility optimization models of binary generalized random response mechanism for the case of differential privacy and approximate differential privacy were established.By graphic
Yihui ZHOU, Laifeng LU, Zhenqiang WU
doaj +2 more sources
Differential Privacy for Coverage Analysis of Software Traces
Yu Hao +4 more
openalex +2 more sources
Privacy-Invasive Software in Filesharing Tools [PDF]
Personal privacy is affected by the occurrence of adware and spyware in peertopeer tools. In an experiment, we investigated five file-sharing tools and found that they all contained ad-/spyware programs, and, that these hidden components communicated with several servers on the Internet.
Andreas Jacobsson +2 more
openaire +1 more source
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
Cloud computing has provided services for users as a software paradigm. However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features.
Changbo Ke +4 more
doaj +1 more source
ABSTRACT Background SOX1 antibody‐positive paraneoplastic neurological syndromes (PNS) exhibit significant population‐specific clinical heterogeneity. While Western cohorts predominantly manifest Lambert‐Eaton myasthenic syndrome (65%–80%), comprehensive clinical characterization and treatment response data in Asian populations remain critically ...
Jin‐Long Ye +11 more
wiley +1 more source
Peeling Back the Student Privacy Pledge [PDF]
Education software is a multi-billion dollar industry that is rapidly growing. The federal government has encouraged this growth through a series of initiatives that reward schools for tracking and aggregating student data.
Pfeffer-Gillett, Alexi
core +2 more sources

