نتایج جستجو برای: pir i bakran mausoleum

تعداد نتایج: 1040144  

Journal: :CoRR 2015
Arman Fazeli Alexander Vardy Eitan Yaakobi

Private information retrieval (PIR) protocols allow a user to retrieve a data item from a database without revealing any information about the identity of the item being retrieved. Specifically, in information-theoretic k-server PIR, the database is replicated among k non-communicating servers, and each server learns nothing about the item retrieved by the user. The cost of PIR protocols is usu...

Journal: :Biological research 2006
Inês E Baldeiras Rosa M Santos Luís M Rosário

Thymeleatoxin (TMX), an activator of Ca2+-sensitive protein kinase C (cPKC) isoforms, was used to assess the PKC isoform specificity of cholinergic potentiation of glucose (11 mM)-induced pulsatile 5-HT/insulin release (PIR) from single mouse pancreatic islets. TMX (100 nM) and carbachol (Cch, 50 microM) enhanced PIR approximately 3-fold while reducing the underlying [Ca2+]i oscillations (durat...

Journal: :Nihon Naibunpi Gakkai zasshi 1990
S Dodo S Miyazaki A Sakanaka R Goi K Chimori K Miura

In our present studies, we evaluated the role of the submandibular glands (SMG) on plasma inactive renin (PIR) releasing mechanisms in rats using some agents which are known to stimulate plasma active renin (PAR) release. The results were analyzed between sialoadenectomized (SX) and sham-operated (control: C) rats. Twenty-four h after the operation, PAR releasing agents, furosemide (FRO) 2.5 mg...

2016
Katherine Froggatt Claire Goodman Hazel Morbey Sue L. Davies Helen Masey Angela Dickinson Wendy Martin Christina Victor

BACKGROUND Public involvement in research (PIR) can improve research design and recruitment. Less is known about how PIR enhances the experience of participation and enriches the data collection process. In a study to evaluate how UK care homes and primary health-care services achieve integrated working to promote older people's health, PIR was integrated throughout the research processes. OB...

2002
Erica Y. Yang Jie Xu Keith H. Bennett

For any critical information services, there are two fundamental challenges: the protection of users’ privacy and the provision of highly available services. Several schemes for private information retrieval (PIR) were proposed to protect users’ privacy when sensitive information stored in (remote) database servers is accessed. However, all the existing PIR schemes are based on a simple honest-...

Journal: :CoRR 2017
Hsuan-Yin Lin Eirik Rosnes

It was recently shown by Fazeli et al. that the storage overhead of a traditional t-server private information retrieval (PIR) protocol can be significantly reduced using the concept of a t-server PIR code. In this work, we show that a family of tserver PIR codes (with increasing dimensions and blocklengths) can be constructed from an existing t-server PIR code through lengthening by a single i...

Journal: :J. Mathematical Cryptology 2008
Thilo Mie

We present a two-round argument system for NP languages with polylogarithmic communication complexity. We introduce a novel property of private information retrieval (PIR) schemes, that we call database-awareness. We construct a concrete database-aware PIR scheme and build our argument system by combining a database-aware PIR scheme with a probabilistically checkable proof system (PCP). Dwork e...

2009
Gabriel Ghinita Panos Kalnis Murat Kantarcioglu Elisa Bertino

Mobile devices with global positioning capabilities allow users to retrieve points of interest (POI) in their proximity. To protect user privacy, it is important not to disclose exact user coordinates to un-trusted entities that provide location-based services. Currently, there are two main approaches to protect the location privacy of users: (i) hiding locations inside cloaking regions (CRs) a...

Journal: :CoRR 2016
Yiwei Zhang Xin Wang Hengjia Wei Gennian Ge

Given a database, the private information retrieval (PIR) protocol allows a user to make queries to several servers and retrieve a certain item of the database via the feedbacks, without revealing the privacy of the specific item to any single server. Classical models of PIR protocols require that each server stores a whole copy of the database. Recently new PIR models are proposed with coding ...

Journal: :Indonesian Journal of Cultural and Community Development 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید