Results 141 to 150 of about 703,183 (313)
Privacy-Invasive Software in Filesharing
Personal privacy is affected by the occurrence of adware and spyware in peer-topeer tools. In an experiment, we investigated five file-sharing tools and found that they all contained ad-/spyware programs, and, that these hidden components communicated with several servers on the Internet.
Jacobsson, Andreas +2 more
openaire +1 more source
A programmable interpenetrating double‐network architecture, created via 3D‐TIPS printing and resin infusion, synergistically combines thermoplastic and thermosetting elastomers to balance structural rigidity and surface softness—crucial for paediatric laryngeal stents.
Elizabeth F. Maughan +14 more
wiley +1 more source
Free‐standing plasmonic gold‐based fractal antennas are fabricated by 3D nanoprinting, employing focused electron beam induced deposition and an optimized purification method to remove carbon while conserving structural fidelity. Simulation and experiment show broadband plasmonic activity, including customizable polarizability, thereby paving the way ...
Verena Reisecker +6 more
wiley +1 more source
Privacy requirements engineering is a crucial aspect of privacy engineering. It aims to integrate privacy principles into organizational and technical processes throughout the software development lifecycle.
Guntur Budi Herwanto +3 more
doaj +1 more source
A unidirectional cerebral organoid–organoid neural circuit is established using a microfluidic platform, enabling controlled directional propagation of electrical signals, neuroinflammatory cues, and neurodegenerative disease–related proteins between spatially separated organoids.
Kyeong Seob Hwang +9 more
wiley +1 more source
Software Assisted Privacy Impact Assessment in Interactive Ubiquitous Computing Systems
Alfredo Pérez Fernández +1 more
openalex +2 more sources
The privacy box: A software proposal
The contradiction of social networks is that revealing of personal, private information can have harmful consequences, yet users continue to disclose such information at an alarming rate. Ironically, the advent of social network sites opens the possibility of a relatively safe place to disclose private information. This article proposes a “privacy box”
openaire +1 more source
An adapted processing for solvent‐free argyrodite solid electrolyte films based on insights into degradation mechanisms of the widely used binder polytetrafluoroethylene is presented. By adapting the dry film processing, long‐term cycling in Si||NMC pouch cells is demonstrated over more than 1000 cycles with a capacity retention of more than 80%, and ...
Maria Rosner +10 more
wiley +1 more source

