Results 71 to 80 of about 2,322,677 (316)
A Survey on Trusted Distributed Artificial Intelligence
Emerging Artificial Intelligence (AI) systems are revolutionizing computing and data processing approaches with their strong impact on society. Data is processed with automated labelling pipelines rather than providing it as input to the system.
Muhammed Akif AĞCA +2 more
doaj +1 more source
Secure agent data integrity shield [PDF]
In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses the requirement of intelligent filtering/processing of information. This paper will address the area of mobile agent data integrity protection.
Borselius +15 more
core +1 more source
Public opinion regarding the use and reuse of sensitive and personal data is very influential e.g. Care.data and the recent GP Data for Planning Research system which has been delayed for several months after launch to clarify data protection fears. Work by the Wellcome Trust’s Understanding Patient Data (UPD) programme has shown that active engagement
Cole, Christian +5 more
openaire +1 more source
TREEHOOSE - an Open Source, Cloud-based Trusted Research Environment
Analysis of sensitive data for the purpose of national statistics, social policy and healthcare research is challenging as it requires significant governance and ethical oversight. Where and how the analysis is performed is controlled by the data controller as the data cannot be freely shared often resides within a monolithic computing environment ...
Li, Simon +4 more
openaire +1 more source
Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham +7 more
wiley +1 more source
Trusted Computing and Secure Virtualization in Cloud Computing [PDF]
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers.
Paladi, Nicolae
core +2 more sources
Open-TEE - An Open Virtual Trusted Execution Environment
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet their use has been limited primarily to applications developed by the device vendors. Recent standardization of TEE interfaces by GlobalPlatform (GP) promises
Asokan, N. +3 more
core +1 more source
Towards a Theory of Trusted Performance in Software Development Projects [PDF]
Within the software development discipline, teams are created and disintegrated at an extremely rapid pace. IT organizations are therefore looking at ways to create an environment of greater performance in a shorter period of time.
Jenkins, Jim, Steinke, Gerhard
core +1 more source
Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz +3 more
wiley +1 more source
Trusted Launch of Virtual Machine Instances in Public IaaS Environments [PDF]
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security
Aslam, Mudassar +3 more
core +4 more sources

