Results 31 to 40 of about 9,848,100 (335)
Friendship links-based privacy-preserving algorithm against inference attacks
Directly publishing the original data of social networks may compromise personal privacy because social relationship data contain sensitive information about users.
Jiawei Shen +3 more
doaj +1 more source
Dynamic utility: the sixth reciprocity mechanism for the evolution of cooperation [PDF]
Game theory has been extensively applied to elucidate the evolutionary mechanism of cooperative behaviour. Dilemmas in game theory are important elements that disturb the promotion of cooperation.
Hiromu Ito, Jun Tanimoto
doaj +1 more source
ABSTRACT Background Pediatric patients with extracranial solid tumors (ST) receiving chemotherapy are at an increased risk for Pneumocystis jirovecii pneumonia (PJP). However, evidence guiding prophylaxis practices in this population is limited. A PJP‐related fatality at our institution highlighted inconsistent prescribing approaches and concerns about
Kriti Kumar +8 more
wiley +1 more source
A Differentiated Anonymity Algorithm for Social Network Privacy Preservation
Devising methods to publish social network data in a form that affords utility without compromising privacy remains a longstanding challenge, while many existing methods based on k-anonymity algorithms on social networks may result in nontrivial utility ...
Yuqin Xie, Mingchun Zheng
doaj +1 more source
Can Social Agents Efficiently Perform in Automated Negotiation?
In the last few years, we witnessed a growing body of literature about automated negotiation. Mainly, negotiating agents are either purely self-driven by maximizing their utility function or by assuming a cooperative stance by all parties involved in the
Victor Sanchez-Anguix +3 more
doaj +1 more source
Maximizing Utility Among Selfish Users in Social Groups
We consider the problem of a social group of users trying to obtain a "universe" of files, first from a server and then via exchange amongst themselves. We consider the selfish file-exchange paradigm of give-and-take, whereby two users can exchange files
Bagaria, Vivek Kumar +2 more
core +1 more source
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard +8 more
wiley +1 more source
SOSYAL SINIFLARDA TÜKETİMİN SINIF BELİRLEYİCİLİK ROLÜ
Neoklasik anlamda ekonomi biliminin incelenmesinde, insanın sosyal bir varlık olarak kabulünün oldukça zayıf yer aldığı rahatlıkla izlenebilir.
Sezgin Açıkalın, Ekrem Gül
doaj +4 more sources
This article is devoted to the peculiarities of state regulation of housing and utility services in Ukraine. The problems of housing and utility services are analyzed.
M. S. Bril +4 more
doaj +1 more source
ABSTRACT We present two pediatric cases of pediatric low‐grade gliomas (PLGG) with BRAF V600E mutations diagnosed and monitored using cerebrospinal fluid (CSF) liquid biopsy analyzed via digital droplet PCR (ddPCR), without tissue biopsy. Both patients were treated with dabrafenib and trametinib and monitored through clinical assessments, magnetic ...
Hannah Sultan +5 more
wiley +1 more source

