Results 71 to 80 of about 667,722 (335)

Embedding Privacy Into Design Through Software Developers: Challenges & Solutions [PDF]

open access: yes, 2022
To make privacy a first-class citizen in software, we argue for equipping developers with usable tools, as well as providing support from organizations, educators, and regulators. We discuss the challenges with the successful integration of privacy features and propose solutions for stakeholders to help developers perform privacy-related tasks.
arxiv   +1 more source

Construction of geriatric hypoalbuminemia predicting model for hypoalbuminemia patients with and without pneumonia and explainability analysis

open access: yesFrontiers in Medicine
Background and objectivesPneumonia portrays a critical health concern in geriatrics. Geriatric pneumonia can lead to changes on other complications, in which hypoalbuminemia is a common complication.
Ziqi Liu   +17 more
doaj   +1 more source

Integrative analysis of circulating tumor cells (CTCs) and exosomes from small‐cell lung cancer (SCLC) patients: a comprehensive approach

open access: yesMolecular Oncology, EarlyView.
This study simultaneously investigated circulating tumor cells (CTCs) and exosomes from small‐cell lung cancer (SCLC) patients. The elevated expression of JUNB and CXCR4 in CTCs was a poor prognostic factor for SCLC patients, whereas exosomal overexpression of these biomarkers revealed a high discrimination ability of patients from healthy individuals,
Dimitrios Papakonstantinou   +13 more
wiley   +1 more source

On Privacy and Utility while Improving Software Quality [PDF]

open access: yes, 2018
Software development produces large amounts of data both from the process, as well as the usage of the software product. Software engineering data science turns this data into actionable insights for improving software quality. However, the processing of
Peters, Fayola
core   +2 more sources

MET variants with activating N‐lobe mutations identified in hereditary papillary renal cell carcinomas still require ligand stimulation

open access: yesMolecular Oncology, EarlyView.
MET variants in the N‐lobe of the kinase domain, found in hereditary papillary renal cell carcinoma, require ligand stimulation to promote cell transformation, in contrast to other RTK variants. This suggests that HGF expression in the microenvironment is important for tumor growth in such patients. Their sensitivity to MET inhibitors opens the way for
Célia Guérin   +14 more
wiley   +1 more source

MET and NF2 alterations confer primary and early resistance to first‐line alectinib treatment in ALK‐positive non‐small‐cell lung cancer

open access: yesMolecular Oncology, EarlyView.
Alectinib resistance in ALK+ NSCLC depends on treatment sequence and EML4‐ALK variants. Variant 1 exhibited off‐target resistance after first‐line treatment, while variant 3 and later lines favored on‐target mutations. Early resistance involved off‐target alterations, like MET and NF2, while on‐target mutations emerged with prolonged therapy.
Jie Hu   +11 more
wiley   +1 more source

Reusable Elements for the Systematic Design of Privacy-Friendly Information Systems: A Mapping Study

open access: yesIEEE Access, 2019
Privacy by design is a new paradigm that promotes embedding privacy considerations throughout the development of information systems, to protect user privacy. Privacy engineering is the nascent field of research and practice that aims to realize this new
Julio C. Caiza   +4 more
doaj   +1 more source

Enhanced Autocompensating Quantum Cryptography System

open access: yes, 2002
We have improved the hardware and software of our autocompensating system for quantum key distribution by replacing bulk optical components at the end stations with fiber-optic equivalents and implementing software that synchronizes end-station ...
Agrawal   +30 more
core   +1 more source

Telerehabilitation Store and Forward Applications: A Review of Applications and Privacy Considerations in Physical and Occupational Therapy Practice

open access: yesInternational Journal of Telerehabilitation, 2015
An overview of store and forward applications commonly used in physical and occupational therapy practice is reviewed with respect to regulation, privacy, security, and clinical applications. A privacy and security checklist provides a clear reference of
Christopher Peterson, Valerie Watzlaf
doaj   +1 more source

Speed Reading in the Dark: Accelerating Functional Encryption for Quadratic Functions with Reprogrammable Hardware

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Functional encryption is a new paradigm for encryption where decryption does not give the entire plaintext but only some function of it. Functional encryption has great potential in privacy-enhancing technologies but suffers from excessive computational ...
Milad Bahadori   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy