• No results found

Shared information

Disjunctive shared information between ontology concepts: application to Gene Ontology

Disjunctive shared information between ontology concepts: application to Gene Ontology

... Using only the MICA to define similarity equates to considering the DAG as a tree, i.e. neglecting the multiple inheritance nature of the DAG. This problem was identified by Resnik, who decided to use only one of the ...

16

ORUTA: PRIVACY SAVING OPEN REVIEWING FOR SHARED INFORMATION IN THE CLOUD

ORUTA: PRIVACY SAVING OPEN REVIEWING FOR SHARED INFORMATION IN THE CLOUD

... imparted information to a high likelihood by just picking a subset of all ...of information by picking all the n hinders in shared ...in shared information are chosen ...whole ...

5

ORUTA: PRIVACY PROTECTING PUBLIC AUDITING FOR SHARED INFORMATION WITH IN THE CLOUD

ORUTA: PRIVACY PROTECTING PUBLIC AUDITING FOR SHARED INFORMATION WITH IN THE CLOUD

... also shared across multiple ...of shared data with these existing mechanisms will inevitably reveal confidential information-identity privacy to public ...on shared data stored in the ...in ...

9

Iterated Economic Games, Logic Gates, and the Flow of Shared Information in Strategic Interactions

Iterated Economic Games, Logic Gates, and the Flow of Shared Information in Strategic Interactions

... the information set of WSLS (columns 1 and 3 in the table above) and the WSLS action in the next round (column 4 in the table above) and the truth table is that of an XNOR logic gate in which matching inputs (00 ...

16

Learning with Shared Information for Image and Video Analysis

Learning with Shared Information for Image and Video Analysis

... In [74] the task of recognizing egocentric activities in an o ffi ce environment is considered and motion descriptors extracted from an outside looking camera are combined with features describing the user eye movements ...

120

DYNAMIC FILES TRANSFER TO MULTI CUSTOMERS CORRELATION BEING PUBLIC INTEGRITY AUDITABILITY

DYNAMIC FILES TRANSFER TO MULTI CUSTOMERS CORRELATION BEING PUBLIC INTEGRITY AUDITABILITY

... the information proprietor ...efficient shared information incorporate reviewing for multi-client operation for ciphertext ...efficient information reviewing plan while in the meantime giving ...

6

A Survey on Public Auditing for Shared Data with Efficient User Revocation in the Cloud

A Survey on Public Auditing for Shared Data with Efficient User Revocation in the Cloud

... of shared information in the cloud. With shared information, once a client adjusts a piece, client additionally needs to figure another mark for the changed ...alter shared ...

8

How do children share information in groups?

How do children share information in groups?

... underlie information sharing in such “hidden profile” ...of information in the unshared information condition are summarized in Table ...discuss shared information more frequently than ...

38

Providing Security and Integrity of Public Data with Proficient User Revocation in the Cloud

Providing Security and Integrity of Public Data with Proficient User Revocation in the Cloud

... For information integrity and consistency, the TPA manages Associate in tending index table and therefore the CSP keeps invigorating Associate in tending symbol for information ...another information ...

6

Virtualized Integrity Verification Scheme in Cloud Environment Using Dynamic Key Update

Virtualized Integrity Verification Scheme in Cloud Environment Using Dynamic Key Update

... the information and administrations may not be completely ...administrations, information is put away in the cloud, as well as routinely shared among countless in a ...imparted information to ...

7

Designing for Reflection on Shared HIV Health Information

Designing for Reflection on Shared HIV Health Information

... peer-shared information among people living with HIV revealed information types that it was important to include, such as the date of diagnosis, medication prescribed and the period over which it was ...

11

Culturally-Sensitive Information-Sharing in Pediatric Palliative Care

Culturally-Sensitive Information-Sharing in Pediatric Palliative Care

... Participants were included when (1) their child died from a life-limiting ill- ness and was treated at either site; (2) their child died 6 months to 5 years before the study; (3) they spoke En- glish, Spanish, Cantonese, ...

9

A requirements specification of an information system to support planned and unplanned use of shared meeting rooms

A requirements specification of an information system to support planned and unplanned use of shared meeting rooms

... were shared was very different on two points: students were not allowed to use the rooms and employees had larger offices in which they could hold ...the shared meeting rooms is ...how shared ...

185

Interactive tables in the wild   visitor experiences with multi touch tables in the Arctic exhibit at the Vancouver Aquarium

Interactive tables in the wild visitor experiences with multi touch tables in the Arctic exhibit at the Vancouver Aquarium

... The simultaneous interaction of different groups of visitors had some positive aspects such as the awareness of potentially interesting items explored by other visitors as discussed above. It sometimes also initiated ...

51

Influence of Quality Management on Successful e- Government

Influence of Quality Management on Successful e- Government

... of information systems and their lack of adaptation to the needs of users can be even a cause of failure to use ...applied information and communication technology can guarantee public service delivered ...

5

Collaborative Web services and the W3C Document Object Model

Collaborative Web services and the W3C Document Object Model

... sufficient information describing synchronized behavior among clients (subscribers in the same ...are shared and the mechanism of control is implemented by passing events and rendering messages through User ...

10

A Novel Methodology Used To Store Big Data Securely In Cloud

A Novel Methodology Used To Store Big Data Securely In Cloud

... enormous information stockpiling and ...the information proprietor are two basic difficulties to make cloud-based huge information stockpiling commonsense and ...huge information stockpiling ...

6

PAPER ON SPOOFED DETECTION IN WIRELESS NETWORK

PAPER ON SPOOFED DETECTION IN WIRELESS NETWORK

... 717 whenever a node needs to send data to another node on a network. After generating attack and routing table for each node the next main objective of system is to find shortest and feasible path in the network. A ...

8

Information sought, information shared: exploring performance and image enhancing drug user-facilitated harm reduction information in online forums

Information sought, information shared: exploring performance and image enhancing drug user-facilitated harm reduction information in online forums

... One important aspect of this research for health pro- fessionals is that forum users were not using health- related language in their discussions with each other nor were they were explicitly talking about ‘harm’ and ...

9

Use of information on the shared customers of healthcare services to support care pathway planning

Use of information on the shared customers of healthcare services to support care pathway planning

... provide information that is valuable for other countries too, because the basic functions of social welfare and healthcare systems are common to all ...of information fully, we need broad understanding of ...

7

Show all 10000 documents...

Related subjects