Results 61 to 70 of about 251,490 (326)
New private information retrieval codes for imperfect privacy
In this paper, we introduce new codes for the private information retrieval (PIR). The conventional Tian-Sun-Chen (TSC) scheme achieves PIR capacity under the perfect privacy conditions with the minimum message length. Based on the TSC scheme, weakly PIR
Jun-Woo Tak +3 more
doaj +1 more source
Polylogarithmic two-round argument systems
We present a two-round argument system for NP languages with polylogarithmic communication complexity. We introduce a novel property of private information retrieval (PIR) schemes, that we call database-awareness.
Mie Thilo
doaj +1 more source
Spoken content retrieval: A survey of techniques and technologies [PDF]
Speech media, that is, digital audio and video containing spoken content, has blossomed in recent years. Large collections are accruing on the Internet as well as in private and enterprise settings.
Ani Nenkova +3 more
core +3 more sources
Effectiveness and Safety of Nusinersen and Risdiplam in Spinal Muscular Atrophy: A Systematic Review
ABSTRACT Objective Spinal Muscular Atrophy (SMA) is a rare genetic disorder marked by progressive muscle weakness and mobility loss. It has a profound physical, emotional and social impact on patients and caregivers, requiring comprehensive medical and supportive care.
Amin Mehrabian +9 more
wiley +1 more source
Smart Catheters for Diagnosis, Monitoring, and Therapy
This study presents a comprehensive review of smart catheters, an emerging class of medical devices that integrate embedded sensors, robotics, and communication systems, offering increased functionality and complexity to enable real‐time health monitoring, diagnostics, and treatment. Abstract This review explores smart catheters as an emerging class of
Azra Yaprak Tarman +12 more
wiley +1 more source
Breaking the MDS-PIR Capacity Barrier via Joint Storage Coding
The capacity of private information retrieval (PIR) from databases coded using maximum distance separable (MDS) codes was previously characterized by Banawan and Ulukus, where it was assumed that the messages are encoded and stored separably in the ...
Hua Sun, Chao Tian
doaj +1 more source
KPDR : An Effective Method of Privacy Protection
To solve the problem of user privacy disclosure caused by attacks on anonymous areas in spatial generalization privacy protection methods, a K and P Dirichlet Retrieval (KPDR) method based on k-anonymity mechanism is proposed.
Zihao Shen +5 more
doaj +1 more source
Multi-Message Private Information Retrieval with Private Side Information [PDF]
We consider the problem of private information retrieval (PIR) where a single user with private side information aims to retrieve multiple files from a library stored (uncoded) at a number of servers. We assume the side information at the user includes a subset of files stored privately (i.e., the server does not know the indices of these files).
Shariatpanahi, Seyed Pooya +2 more
openaire +2 more sources
Materials and System Design for Self‐Decision Bioelectronic Systems
This review highlights how self‐decision bioelectronic systems integrate sensing, computation, and therapy into autonomous, closed‐loop platforms that continuously monitor and treat diseases, marking a major step toward intelligent, self‐regulating healthcare technologies.
Qiankun Zeng +9 more
wiley +1 more source
Private Information Retrieval Schemes for Coded Data with Arbitrary Collusion Patterns
In Private Information Retrieval (PIR), one wants to download a file from a database without revealing to the database which file is being downloaded. Much attention has been paid to the case of the database being encoded across several servers, subsets ...
Freij-Hollanti, Ragnar +5 more
core +1 more source

