Results 1 to 10 of about 43,942 (146)
Proxy-Terms Based Query Obfuscation Technique for Private Web Search [PDF]
Search engines store users’ queries in a query log for performing personalized information retrieval. However, query logs cause privacy concerns and reveal a lot of information about individuals if used against them.
Shariq Bashir +2 more
doaj +4 more sources
Multi-Group ObScure Logging (MG-OSLo) A Privacy-Preserving Protocol for Private Web Search [PDF]
The Web Search Engine (WSE) is a software system used to retrieve data from the web successfully. WSE uses the user’s search queries to build the user’s profile and provide personalized results.
Mohib Ullah +6 more
doaj +2 more sources
Private Web Search Using Proxy-Query Based Query Obfuscation Scheme
People use web search engines to retrieve information from the world wide web. Search engines maintain query logs to refine retrieved information for personalized web search.
Shariq Bashir, Akmal Saeed Khattak
doaj +2 more sources
Online resources for information on shoulder arthroplasty: an assessment of quality and readability [PDF]
Background Many patients use online resources to educate themselves on surgical procedures and make well-informed healthcare decisions. The aim of our study was to evaluate the quality and readability of online resources exploring shoulder arthroplasty ...
Mohamad Y. Fares +5 more
doaj +1 more source
Browsers’ Private Mode: Is It What We Were Promised?
Web browsers are one of the most used applications on every computational device in our days. Hence, they play a pivotal role in any forensic investigation and help determine if nefarious or suspicious activity has occurred on that device.
Kris Hughes +5 more
doaj +1 more source
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference.
Ben Mokhtar, Sonia +5 more
openaire +3 more sources
Web search engines usually keep users’ profiles for multiple purposes, such as result ranking and relevancy, market research, and targeted advertisements. However, user web search history may contain sensitive and private information about the user, such
Rafiullah Khan +4 more
doaj +1 more source
Commodification beyond data: regulating the separation of information from noise
Digital technology brought informational saturation to our lives. In cyberspace, private and business users need help to make valuable pieces of information stand out from the noise of excessive information.
Linus J. Hoffmann
doaj +1 more source
Analysis of domestic language tourism in Spain [PDF]
The general objective of this study was to research the revitalisation of language tourism (LT) activities in Spain. More specifically, the study aimed at describing the LT phenomenon, analysing the global and Spanish LT market, and examining domestic LT
Laia Tonda, Montserrat Iglesias
doaj +1 more source
Introduction: Given the expansion of public-private partnership (PPP) policy in the provision of primary health care to the elderly in different countries, this study aimed to investigate the experiences and achievements of PPP in this field using a ...
Saber Azami Aghdash +4 more
doaj +1 more source

