منابع مشابه
Secrecy of Communications in Data Transmission by Impulses with Unknown Moments of Appearance and Disappearance
We carried out a comparative analysis of the algorithms for detecting a rectangular impulse against Gaussian white noise under either authorized or unauthorized access to the transmitted data. We presupposed that for data transmission the binary communication system is used and that the useful information in the data is whether the signal is present or absent. The case is that unauthorized acce...
متن کاملFDA seeks genome-based drug data.
ingly high. Nearly 4 in 10 adults in Botswana and Swaziland are infected with the virus. China, India, Indonesia, and Russia are threatened by a new wave of HIV spread, mostly through injecting drug use and unprotected sex. In Eastern Europe and Central Asia, where an estimated 1.5 million individuals are living with HIV, the most severely affected areas are the Russian Federation, Ukraine, and...
متن کاملSecrecy logic: S -secrecy structures
Let S = 〈L, S〉 be a deductive system. An S -secrecy logic is a quadruple K = 〈FmL(V ),K,B, S〉 , where FmL(V ) is the algebra of L-formulas, K,B are S -theories, with B ⊆ K and S ⊆ K such that S ∩ B = ∅ . K corresponds to information deducible from a knowledge base, B to information deducible from the publicly accessible (or browsable) part of the knowledge base and S is a secret set, a set of s...
متن کاملRare cancer trial design: lessons from FDA approvals.
A systematic analysis of clinical trials supporting rare cancer drug approvals may identify concepts and terms that can inform the effective design of prospective clinical trials for rare cancers. In this article, using annual incidence ≤6 of 100,000 individuals to define "rare cancer," we identified clinical trials for rare cancers, supporting U.S. Food and Drug Administration (FDA) drug appro...
متن کاملSecrecy-Preserving Reasoning using Secrecy Envelopes
Inmany applications of networked information systems, the need to share information often has to be balanced against the need to protect secret information from unintended disclosure, e.g., due to copyright, privacy, security, or commercial considerations. We study the problem of secrecy-preserving reasoning, that is, answering queries using secret information, whenever it is possible to do so,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 2014
ISSN: 0028-0836,1476-4687
DOI: 10.1038/511519a