Results 71 to 80 of about 667,722 (335)
Embedding Privacy Into Design Through Software Developers: Challenges & Solutions [PDF]
To make privacy a first-class citizen in software, we argue for equipping developers with usable tools, as well as providing support from organizations, educators, and regulators. We discuss the challenges with the successful integration of privacy features and propose solutions for stakeholders to help developers perform privacy-related tasks.
arxiv +1 more source
Background and objectivesPneumonia portrays a critical health concern in geriatrics. Geriatric pneumonia can lead to changes on other complications, in which hypoalbuminemia is a common complication.
Ziqi Liu+17 more
doaj +1 more source
This study simultaneously investigated circulating tumor cells (CTCs) and exosomes from small‐cell lung cancer (SCLC) patients. The elevated expression of JUNB and CXCR4 in CTCs was a poor prognostic factor for SCLC patients, whereas exosomal overexpression of these biomarkers revealed a high discrimination ability of patients from healthy individuals,
Dimitrios Papakonstantinou+13 more
wiley +1 more source
On Privacy and Utility while Improving Software Quality [PDF]
Software development produces large amounts of data both from the process, as well as the usage of the software product. Software engineering data science turns this data into actionable insights for improving software quality. However, the processing of
Peters, Fayola
core +2 more sources
MET variants in the N‐lobe of the kinase domain, found in hereditary papillary renal cell carcinoma, require ligand stimulation to promote cell transformation, in contrast to other RTK variants. This suggests that HGF expression in the microenvironment is important for tumor growth in such patients. Their sensitivity to MET inhibitors opens the way for
Célia Guérin+14 more
wiley +1 more source
Alectinib resistance in ALK+ NSCLC depends on treatment sequence and EML4‐ALK variants. Variant 1 exhibited off‐target resistance after first‐line treatment, while variant 3 and later lines favored on‐target mutations. Early resistance involved off‐target alterations, like MET and NF2, while on‐target mutations emerged with prolonged therapy.
Jie Hu+11 more
wiley +1 more source
Reusable Elements for the Systematic Design of Privacy-Friendly Information Systems: A Mapping Study
Privacy by design is a new paradigm that promotes embedding privacy considerations throughout the development of information systems, to protect user privacy. Privacy engineering is the nascent field of research and practice that aims to realize this new
Julio C. Caiza+4 more
doaj +1 more source
Enhanced Autocompensating Quantum Cryptography System
We have improved the hardware and software of our autocompensating system for quantum key distribution by replacing bulk optical components at the end stations with fiber-optic equivalents and implementing software that synchronizes end-station ...
Agrawal+30 more
core +1 more source
An overview of store and forward applications commonly used in physical and occupational therapy practice is reviewed with respect to regulation, privacy, security, and clinical applications. A privacy and security checklist provides a clear reference of
Christopher Peterson, Valerie Watzlaf
doaj +1 more source
Functional encryption is a new paradigm for encryption where decryption does not give the entire plaintext but only some function of it. Functional encryption has great potential in privacy-enhancing technologies but suffers from excessive computational ...
Milad Bahadori+3 more
doaj +1 more source