Suchergebnisse - "Distributed computation protocol"
-
1
Autoren:
Quelle: 2024 IEEE International Conference on Cyber Security and Resilience (CSR). :658-663
-
2
Autoren:
Quelle: Lecture Notes in Computer Science ISBN: 9783030308582
-
3
Autoren:
Quelle: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing. :1415-1424
Schlagwörter: Statistics and Probability, Alternative medicine, Information privacy, FOS: Health sciences, Diagnostic Methods for COVID-19 Detection, Estimator, 7. Clean energy, Artificial Intelligence, Computer security, Health Sciences, FOS: Mathematics, Pathology, Privacy protection, Randomized Response, Local Differential Privacy, Contingency Tables, Distributed computation protocol, Differential Privacy, Statistical Methods for Sensitive Survey Questions, Privacy Preservation, Computer network, Randomized Response Technique, Statistics, Privacy-Preserving Techniques for Data Analysis and Machine Learning, 16. Peace & justice, Computer science, Infectious Diseases, Computer Science, Physical Sciences, Protocol (science), Sensitive Questions, Medicine, Stratified Sampling, Randomized response, Mathematics
Dateibeschreibung: application/pdf
-
4
Autoren: Ishmaev, Georgy
Quelle: Ethics & Information Technology; Sep2021, Vol. 23 Issue 3, p239-252, 14p
Schlagwörter: IDENTITY management systems, SOVEREIGNTY, BLOCKCHAINS, PRIVACY, SYSTEM identification
-
5
Autoren:
Quelle: Security & Communication Networks; 11/24/2020, p1-8, 8p
Schlagwörter: RADIO access networks, VIRTUAL networks, 5G networks, INTERNET of things, INFORMATION networks
-
6
Autoren: et al.
Quelle: E-Infrastructure & e-Services; 2016, p178-191, 14p
-
7
Autoren:
Quelle: 2014 IEEE International Conference on Acoustics, Speech & Signal Processing (ICASSP); 2014, p7401-7405, 5p
-
8
Autoren: Van Meter, Rodney
Quelle: Quantum Networking; 2014, p113-130, 18p
-
9
Autoren:
Quelle: Advances in Network Analysis & its Applications; 2013, p231-253, 23p
-
10
Autoren: et al.
Quelle: Theory of Cryptography (9783540709350); 2007, p311-322, 12p
-
11
Autoren: et al.
Quelle: World Wide Web; Sep2015, Vol. 18 Issue 5, p1481-1517, 37p
Schlagwörter: ONLINE social networks, DATA mining, DATA analysis, SUBGRAPHS, DATA security
-
12
Autoren:
Quelle: International Journal of Advanced Manufacturing Technology; Oct2008, Vol. 38 Issue 11/12, p1260-1270, 11p, 4 Color Photographs, 10 Diagrams
-
13
Autoren:
Quelle: Algorithmica; Jun2001, Vol. 33 Issue 1, p89-103, 15p
-
14
Autoren:
Quelle: Mathematics (2227-7390); Feb2022, Vol. 10 Issue 4, pN.PAG-N.PAG, 1p
Schlagwörter: NON-fungible tokens, STREAMING video & television, SMARTWATCHES, TIME management, SMARTPHONES
-
15
Autoren:
Quelle: Sensors (14248220); Oct2019, Vol. 19 Issue 19, p4339, 1p
Schlagwörter: WIRELESS sensor networks, MULTISENSOR data fusion, FOLKSONOMIES, SENSOR networks, IMAGE fusion
-
16
Autoren: et al.
Quelle: Electronics Letters (Institution of Engineering & Technology); 08/14/1997, Vol. 33 Issue 17, p1453-1454, 2p
-
17
Autoren: et al.
Quelle: 2000 26th Annual Conference of the IEEE Industrial Electronics Society. IECON 2000. 2000 IEEE International Conference on Industrial Electronics, Control & Instrumentation. 21st Century Technologies; 2000, p818-818, 1p
-
18
Autoren:
Resource Type: eBook.
Schlagworte: Cryptography, Data encryption (Computer science), Computer engineering, Computer networks, Data protection, Coding theory, Information theory
Categories: COMPUTERS / Security / Cryptography & Encryption, COMPUTERS / Information Theory, COMPUTERS / Security / General, COMPUTERS / Hardware / General
-
19
Autoren:
Resource Type: eBook.
Schlagworte: Cryptography, Data encryption (Computer science), Data protection, Computer networks, Coding theory, Information theory, Application software
Categories: COMPUTERS / Security / Cryptography & Encryption, COMPUTERS / Business & Productivity Software / General, COMPUTERS / Information Theory, COMPUTERS / Networking / General, COMPUTERS / Security / General
-
20
Autoren: et al.
Resource Type: eBook.
Schlagworte: Computer networks, Computers, Special purpose, Coding theory, Information theory, Application software, Computer science—Mathematics, Mathematical statistics
Categories: COMPUTERS / Networking / General, COMPUTERS / Business & Productivity Software / General, COMPUTERS / Computer Architecture, COMPUTERS / Computer Science, COMPUTERS / Information Theory, MATHEMATICS / Probability & Statistics / General
Nájsť tento článok vo Web of Science
Full Text Finder