Results 71 to 80 of about 78,996 (280)

Through the lens of marketing authorization holders: experience in use of real‐world data and real‐world evidence in drug development and regulatory submissions in EU

open access: yesBritish Journal of Clinical Pharmacology, EarlyView.
Abstract Aim The aim of this study was to assess the general and product‐specific experiences of MAHs use of RWD/RWE in medicines development and in their regulatory submissions, and to explore organizational aspects of MAHs related to RWD/RWE. Methods An electronic survey was conducted, and information collected directly from MAHs.
Sini M. Eskola   +5 more
wiley   +1 more source

A Privacy-Preserving Edge Computation-Based Face Verification System for User Authentication

open access: yesIEEE Access, 2019
The face recognition has become a common means of identity authentication because of the advantages of uniqueness, non-invasive and not easy to be stolen. The outsourcing of face recognition to the service provider is a typical manner nowadays.
Xiang Wang   +3 more
doaj   +1 more source

A Systematic Approach to Optimise Management in Global Sourcing Relationships [PDF]

open access: yes, 2009
Despite a large number of studies, global IT sourcing projects are, in practice, performed ad-hoc and rely mostly on the manager’s experience. Outsourcing software development presents extra challenges because development is performed in an inter ...
Ponisio, María Laura
core   +2 more sources

A Practical Searchable Symmetric Encryption Scheme for Smart Grid Data

open access: yes, 2018
Outsourcing data storage to the remote cloud can be an economical solution to enhance data management in the smart grid ecosystem. To protect the privacy of data, the utility company may choose to encrypt the data before uploading them to the cloud ...
Li, Jiangnan   +2 more
core   +1 more source

Sailing From Penalties to Accountability: Business Strategies and Governance for Firms to Innovate After Environmental Misconduct

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Firms' continuous pursuit of making a profit in the competitive market may ignore the actions related to environmental responsibilities. This set of actions for financial gains constitutes environmental misconduct, which not only harms ecosystems and communities but also brings reputational damage. Negative press and social media amplification
Ashutosh Singh   +3 more
wiley   +1 more source

On Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications

open access: yesMathematics
Modular exponentiation is crucial for secure data exchange in cryptography, especially for resource-constrained Internet of Things (IoT) devices. These devices often rely on third-party servers to handle computationally intensive tasks like modular ...
Satyabrat Rath   +2 more
doaj   +1 more source

Protecting genomic data analytics in the cloud: state of the art and opportunities

open access: yesBMC Medical Genomics, 2016
The outsourcing of genomic data into public cloud computing settings raises concerns over privacy and security. Significant advancements in secure computation methods have emerged over the past several years, but such techniques need to be rigorously ...
Haixu Tang   +10 more
doaj   +1 more source

Enhancing competitive advantage for European maritime sector [PDF]

open access: yes, 2014
This poster presentation explores the topic of enhancing competitive advantage for the European maritime ...
Duffy, Alexander   +2 more
core  

A Business Framework for Product Take‐Back—A Structured Multiple‐Case Analysis

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The potential of take‐back systems remains largely unrealized as initiatives have proven difficult to implement in practice. The question is why we do not see more take‐back systems given the substantial environmental benefits. We try to understand the challenges and stumbling blocks in setting up take‐back from a business perspective.
Rasmus Jørgensen, Torben Pedersen
wiley   +1 more source

Privacy-preserving and efficient outsourcing computation scheme for principal component analysis

open access: yesCybersecurity
Currently, the rapid development of Internet of Things (IoT) technology and the deepening digital transformation of traditional industries have driven substantial growth in the Machine Learning as a Service (MLaaS) market to meet massive data processing ...
Yan Ding, Ye Du
doaj   +1 more source

Home - About - Disclaimer - Privacy