Suggested Topics within your search.
Suggested Topics within your search.
- Computer science 3
- Application software 1
- Automata 1
- Automatic speech recognition 1
- Coding and Information Theory 1
- Coding theory 1
- Computer access points 1
- Development 1
- Digital techniques 1
- Enterprise application integration (Computer systems) 1
- Government policy 1
- Graphical user interfaces (Computer systems) 1
- Human-computer interaction 1
- Human-machine systems 1
- Information theory 1
- Interactive computer systems 1
- Java (Computer program language) 1
- Management information systems 1
- Mathematics 1
- Moral and ethical aspects 1
- Natural language processing (Computer science) 1
- Object-oriented programming (Computer science) 1
- Prevention 1
- Programming Languages, Compilers, Interpreters 1
- Programming languages (Electronic computers) 1
- Psychological aspects 1
- Psychology 1
- Scripting languages (Computer science) 1
- Semantic integration (Computer systems) 1
- Service-oriented architecture (Computer science) 1
-
4561
-
4562
Optimal Scheduling Strategy for Regional Microgrid considering Large-Scale Access of Electric Vehicles
Published 2022-01-01Get full text
Article -
4563
A New Approach for Resolving Conflicts in Actionable Behavioral Rules
Published 2014-01-01Get full text
Article -
4564
CSN: The Conceptually Manageable Sensor Network
Published 2015-03-01“…For the last decade, computer science and information technology have been rapidly expanding their application areas from computation and data processing inside computers to the real time monitoring and management of the real world outside computers. …”
Get full text
Article -
4565
-
4566
Multimodal Deep Feature Fusion (MMDFF) for RGB-D Tracking
Published 2018-01-01Get full text
Article -
4567
-
4568
-
4569
-
4570
Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy
Published 2014-01-01Get full text
Article -
4571
A Relation Routing Scheme for Distributed Semantic Media Query
Published 2013-01-01Get full text
Article -
4572
-
4573
Dynamic energy balanced max flow routing in energy-harvesting sensor networks
Published 2017-11-01Get full text
Article -
4574
Modeling Spatial Social Complex Networks for Dynamical Processes
Published 2018-01-01Get full text
Article -
4575
A New Approach to Fuzzy Differential Equations Using Weakly-Compatible Self-Mappings in Fuzzy Metric Spaces
Published 2021-01-01Get full text
Article -
4576
Privacy view and target of differential privacy
Published 2023-10-01“…The study aimed to address the challenges in understanding the privacy goals of differential privacy by analyzing the privacy controversies surrounding it in various fields.It began with the example of data correlation and highlighted the differing perspectives among scholars regarding the targets of privacy protection.In cases where records in a dataset were correlated, adversaries can exploit this correlation to infer sensitive information about individuals, thereby sparking a debate on whether this violates privacy protection.To investigate the influence of privacy theories in the legal domain on defining privacy, two mainstream privacy theories in the computer field were examined.The first theory, limited access to personal information, focuses on preventing others from accessing an individual’s sensitive information.According to this theory, privacy mechanisms should aim to prevent adversaries from accessing a user’s actual information.In contrast, the second theory, control over personal information, emphasizes an individual’s right to communicate personal information to others.This theory suggests that the disclosure of personal information due to the relevance of others sharing data should not be considered a breach of privacy.Then the controversies of differential privacy were analyzed in the fields of computer science, social science, ethics and human-computer interaction due to their different understandings of privacy.By exploring the privacy concept of differential privacy from a multidisciplinary perspective, this study helps readers gain a correct understanding of the privacy viewpoint and goals of differential privacy while enhancing their understanding of the concept of “privacy” itself.…”
Get full text
Article -
4577
-
4578
-
4579
Skin Tumors Diagnosis Utilizing Case Based Reasoning and The Expert System
Published 2020-06-01Get full text
Article -
4580