Results 61 to 70 of about 251,490 (326)

New private information retrieval codes for imperfect privacy

open access: yesICT Express
In this paper, we introduce new codes for the private information retrieval (PIR). The conventional Tian-Sun-Chen (TSC) scheme achieves PIR capacity under the perfect privacy conditions with the minimum message length. Based on the TSC scheme, weakly PIR
Jun-Woo Tak   +3 more
doaj   +1 more source

Polylogarithmic two-round argument systems

open access: yesJournal of Mathematical Cryptology, 2008
We present a two-round argument system for NP languages with polylogarithmic communication complexity. We introduce a novel property of private information retrieval (PIR) schemes, that we call database-awareness.
Mie Thilo
doaj   +1 more source

Spoken content retrieval: A survey of techniques and technologies [PDF]

open access: yes, 2012
Speech media, that is, digital audio and video containing spoken content, has blossomed in recent years. Large collections are accruing on the Internet as well as in private and enterprise settings.
Ani Nenkova   +3 more
core   +3 more sources

Effectiveness and Safety of Nusinersen and Risdiplam in Spinal Muscular Atrophy: A Systematic Review

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Spinal Muscular Atrophy (SMA) is a rare genetic disorder marked by progressive muscle weakness and mobility loss. It has a profound physical, emotional and social impact on patients and caregivers, requiring comprehensive medical and supportive care.
Amin Mehrabian   +9 more
wiley   +1 more source

Smart Catheters for Diagnosis, Monitoring, and Therapy

open access: yesAdvanced Healthcare Materials, EarlyView.
This study presents a comprehensive review of smart catheters, an emerging class of medical devices that integrate embedded sensors, robotics, and communication systems, offering increased functionality and complexity to enable real‐time health monitoring, diagnostics, and treatment. Abstract This review explores smart catheters as an emerging class of
Azra Yaprak Tarman   +12 more
wiley   +1 more source

Breaking the MDS-PIR Capacity Barrier via Joint Storage Coding

open access: yesInformation, 2019
The capacity of private information retrieval (PIR) from databases coded using maximum distance separable (MDS) codes was previously characterized by Banawan and Ulukus, where it was assumed that the messages are encoded and stored separably in the ...
Hua Sun, Chao Tian
doaj   +1 more source

KPDR : An Effective Method of Privacy Protection

open access: yesComplexity, 2021
To solve the problem of user privacy disclosure caused by attacks on anonymous areas in spatial generalization privacy protection methods, a K and P Dirichlet Retrieval (KPDR) method based on k-anonymity mechanism is proposed.
Zihao Shen   +5 more
doaj   +1 more source

Multi-Message Private Information Retrieval with Private Side Information [PDF]

open access: yes2018 IEEE Information Theory Workshop (ITW), 2018
We consider the problem of private information retrieval (PIR) where a single user with private side information aims to retrieve multiple files from a library stored (uncoded) at a number of servers. We assume the side information at the user includes a subset of files stored privately (i.e., the server does not know the indices of these files).
Shariatpanahi, Seyed Pooya   +2 more
openaire   +2 more sources

Materials and System Design for Self‐Decision Bioelectronic Systems

open access: yesAdvanced Materials, EarlyView.
This review highlights how self‐decision bioelectronic systems integrate sensing, computation, and therapy into autonomous, closed‐loop platforms that continuously monitor and treat diseases, marking a major step toward intelligent, self‐regulating healthcare technologies.
Qiankun Zeng   +9 more
wiley   +1 more source

Private Information Retrieval Schemes for Coded Data with Arbitrary Collusion Patterns

open access: yes, 2017
In Private Information Retrieval (PIR), one wants to download a file from a database without revealing to the database which file is being downloaded. Much attention has been paid to the case of the database being encoded across several servers, subsets ...
Freij-Hollanti, Ragnar   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy