Results 91 to 100 of about 4,825 (248)
Secure Data De-Duplication Based on Threshold Blind Signature and Bloom Filter in Internet of Things
Within the cloud environment, the availability of storage, as well as bandwidth, can be effectively preserved in virtue of data de-duplication. However, refraining redundancy from additional storage or communication is not trivial due to security ...
Bo Mi +4 more
doaj +1 more source
An Overview of Data Storage in Cloud Computing [PDF]
Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be
Ahuja, Ravin +3 more
core
Linking the Comparison and Graphical Approaches to Bipartite Matching
Summary Bipartite record linkage has the goal of identifying observations referring to the same individual, called coreferent observations, across two distinct non‐duplicated datasets. The two main approaches to solve this task are the Fellegi–Sunter model, which relies on pairwise comparisons of observations, and the graphical record linkage model ...
Edoardo Redivo
wiley +1 more source
Security control scheme for cloud data copy based on differential privacy model
In cloud computing environment,adversary may use data deduplication as a side channel to eavesdrop users’ privacy.In order to tackle this serious issue,a secure copy number control scheme was proposed.The highlights of the proposed scheme lie in ...
Jun REN,Jin-bo XIONG,Zhi-qiang YAO
doaj +3 more sources
Post‐Event Strategies for Workplace Violence Affecting Hospital Staff: A Scoping Review
ABSTRACT Aims To map the evidence on post‐incident strategies for workplace violence in global hospital settings, define current literature gaps and provide direction for future research. Design Scoping review guided by Joanna Briggs Institute methodology.
Dana Sammut +2 more
wiley +1 more source
Preventing DDoS using Bloom Filter: A Survey
Distributed Denial-of-Service (DDoS) is a menace for service provider and prominent issue in network security. Defeating or defending the DDoS is a prime challenge. DDoS make a service unavailable for a certain time.
Borgohain, Samir Kumar +2 more
core +1 more source
Low socioeconomic status (SES) is negatively associated with children's cognitive and academic performance, leading to long‐term educational and economic disparities. In particular, SES is a powerful predictor of executive function (EF), language ability, and academic achievement.
Divyangana Rakesh +3 more
wiley +1 more source
ABSTRACT Families remain central to later‐life support, yet evidence on intergenerational caregiving is fragmented across dyads, generations, and cultural contexts. This scoping review maps how caregiving is organized and negotiated across structural, associational, affectual, functional, consensual, and normative dimensions.
Chuen Wei Alvin Seah +6 more
wiley +1 more source
ABSTRACT This paper investigates the evolving landscape of research on the economics of artificial intelligence (AI). Using topic modeling on a corpus of over 4,600 academic papers, we identify the dominant themes that have shaped the literature to date and highlight areas that remain relatively underexplored. In addition, we assess the extent to which
Lucy Hampton, John Lourenze Poquiz
wiley +1 more source
Cross-platform deduplication of athletes’ medical cases considering data integrity
The heterogeneity of Electronic Health Record (EHR) systems leads to significant differences in data formats and structures across different platforms.
Tanwei Shang, Ziqing Zhao
doaj +1 more source

