نتایج جستجو برای: enhancing values

تعداد نتایج: 601335  

Journal: :Pervasive and Mobile Computing 2015
Claudio Bettini Daniele Riboni

Pervasive and mobile computing applications are dramatically increasing the amount of personal data released to service providers as well as to third parties. Data includes geographical and indoor position of individuals, their movement patterns as well as sensor-acquired data that may reveal individuals’ physical conditions, habits, and, in general, information that may lead to undesired conse...

Journal: :IEICE Transactions 2005
Shigeki Yamada Eiji Kamioka

Ubiquitous computing (ubicomp) demands new security and privacy enhancing technologies for the new information and communication environments where a huge number of computers interact with each other in a distributed and ad hoc manner to access various resources and services. This paper surveys emerging security and privacy enhancing technologies, focusing on access control in ubiquitous comput...

Journal: :CoRR 2012
Emiliano De Cristofaro

Over the past several years, DNA sequencing has emerged as one of the driving forces in life-sciences, paving the way for affordable and accurate whole genome sequencing. As genomes represent the entirety of an organism’s hereditary information, the availability of complete human genomes prompts a wide range of revolutionary applications. The hope for improving modern healthcare and better unde...

Journal: :CoRR 2012
Jaap-Henk Hoepman

In this paper we define the notion of a privacy design strategy. These strategies help to support privacy by design throughout the full software development life cycle, even before the design phase. Using current data protection legislation as point of departure we derive the following eight privacy design strategies: MINIMISE, HIDE, SEPARATE, AGGREGATE, INFORM, CONTROL, ENFORCE, and DEMONSTRAT...

2014
Jaap-Henk Hoepman

In this paper we define the notion of a privacy design strategy. These strategies help IT architects to support privacy by design early in the software development life cycle, during concept development and analysis. Using current data protection legislation as point of departure we derive the following eight privacy design strategies: MINIMISE, HIDE, SEPARATE, AGGREGATE, INFORM, CONTROL, ENFOR...

Journal: :Sports medicine 2013
Jaime Morente-Sánchez Mikel Zabala

Doping in sport is a well-known phenomenon that has been studied mainly from a biomedical point of view, even though psychosocial approaches are also key factors in the fight against doping. This phenomenon has evolved greatly in recent years, and greater understanding of it is essential for developing efficient prevention programmes. In the psychosocial approach, attitudes are considered an in...

2011
Nina Schwenzer Christina Pfannenberg Holger Schmidt Bernd Pichler Claus D. Claussen

Much has already been written about the technology, the basic ideas as well as the potential clinical needs behind the combining of MR and PET. As with all new imaging methodologies, there is debate as to how much this technology is really needed (similarly, for example, with the availability of PET/CT) and the discussion regarding MR/PET in particular concerns the level of integration and, eve...

Journal: :British journal of sports medicine 2014
Peter Rex Harcourt Francois Marclay Brett Clothier

BACKGROUND The World Anti-Doping Agency (WADA) is introducing enhancements to doping investigations in its 2015 Code, which include improved sharing of information between antidoping organisations (including sporting bodies) and enhanced accountability of athlete support staff. These additions will improve the control of links between sports doping and organised crime. In February 2013 the Aust...

Journal: :South African Computer Journal 2003
Martin S. Olivier

While a number of privacy-enhancing technologies have been proposed over the past quarter century, very little has been done to generalise the notion. Privacy-enhancing technologies have typically been discussed for specific applications (such as confidential and/or anonymous e-mail) or in specific contexts (such as on the Internet). This paper takes cognisance of existing privacy-enhancing tec...

2000
Zhimei Jiang Li-Fung Chang Byoung-Jo J. Kim Kin K. Leung

Performance enhancing proxies have drawn considerable interests from the network community as an e ective approach to improve user experience in cellular networks. However, previous research has been focusing on the design of proxy servers as well as the functions that these servers provide. In this paper, we study the placement of proxy servers, especially the approach of incorporating proxies...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید