To see the other types of publications on this topic, follow the link: Sensitive information.

Dissertations / Theses on the topic 'Sensitive information'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Sensitive information.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

De, Cristofaro E. "Sharing sensitive information with privacy." Thesis, University College London (University of London), 2011. http://discovery.ucl.ac.uk/1450712/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ahlqvist, Ola. "Context Sensitive Transformation of Geographic Information." Doctoral thesis, Stockholm : Univ, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Forti, Cristiano Augusto Borges. "Bank dividends and signaling to information-sensitive depositors." reponame:Repositório Institucional do FGV, 2012. http://hdl.handle.net/10438/10518.

Full text
Abstract:
Submitted by Cristiano Forti (crforti@gmail.com) on 2013-02-20T17:15:40Z No. of bitstreams: 1 Tese Doutorado 2012 - Versão Final.pdf: 1027415 bytes, checksum: 2fa17755a9aff4536228a46badc3d5f2 (MD5)<br>Approved for entry into archive by Suzinei Teles Garcia Garcia (suzinei.garcia@fgv.br) on 2013-02-20T17:46:28Z (GMT) No. of bitstreams: 1 Tese Doutorado 2012 - Versão Final.pdf: 1027415 bytes, checksum: 2fa17755a9aff4536228a46badc3d5f2 (MD5)<br>Made available in DSpace on 2013-02-20T18:30:20Z (GMT). No. of bitstreams: 1 Tese Doutorado 2012 - Versão Final.pdf: 1027415 bytes, checksum: 2fa17755
APA, Harvard, Vancouver, ISO, and other styles
4

Kacem, Sahraoui Ameni. "Personalized information retrieval based on time-sensitive user profile." Thesis, Toulouse 3, 2017. http://www.theses.fr/2017TOU30111/document.

Full text
Abstract:
Les moteurs de recherche, largement utilisés dans différents domaines, sont devenus la principale source d'information pour de nombreux utilisateurs. Cependant, les Systèmes de Recherche d'Information (SRI) font face à de nouveaux défis liés à la croissance et à la diversité des données disponibles. Un SRI analyse la requête soumise par l'utilisateur et explore des collections de données de nature non structurée ou semi-structurée (par exemple : texte, image, vidéo, page Web, etc.) afin de fournir des résultats qui correspondent le mieux à son intention et ses intérêts. Afin d'atteindre cet ob
APA, Harvard, Vancouver, ISO, and other styles
5

Ema, Ismat. "Sensitive Data Migration to the Cloud." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Forde, Edward Steven. "Security Strategies for Hosting Sensitive Information in the Commercial Cloud." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3604.

Full text
Abstract:
IT experts often struggle to find strategies to secure data on the cloud. Although current security standards might provide cloud compliance, they fail to offer guarantees of security assurance. The purpose of this qualitative case study was to explore the strategies used by IT security managers to host sensitive information in the commercial cloud. The study's population consisted of information security managers from a government agency in the eastern region of the United States. The routine active theory, developed by Cohen and Felson, was used as the conceptual framework for the study. The
APA, Harvard, Vancouver, ISO, and other styles
7

Träutlein, Sarah Anna Elisabeth [Verfasser], Peter [Akademischer Betreuer] Buxmann, and Alexander [Akademischer Betreuer] Benlian. "Employees' sensitive information disclosure behavior in enterprise information systems / Sarah Träutlein ; Peter Buxmann, Alexander Benlian." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2017. http://d-nb.info/1149252448/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Träutlein, Sarah [Verfasser], Peter [Akademischer Betreuer] Buxmann, and Alexander [Akademischer Betreuer] Benlian. "Employees' sensitive information disclosure behavior in enterprise information systems / Sarah Träutlein ; Peter Buxmann, Alexander Benlian." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2017. http://d-nb.info/1149252448/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Xinfeng. "Time-sensitive Information Communication, Sensing, and Computing in Cyber-Physical Systems." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1397731767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Yin. "Methodologies, Techniques, and Tools for Understanding and Managing Sensitive Program Information." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/103421.

Full text
Abstract:
Exfiltrating or tampering with certain business logic, algorithms, and data can harm the security and privacy of both organizations and end users. Collectively referred to as sensitive program information (SPI), these building blocks are part and parcel of modern software systems in domains ranging from enterprise applications to cyberphysical setups. Hence, protecting SPI has become one of the most salient challenges of modern software development. However, several fundamental obstacles stand on the way of effective SPI protection: (1) understanding and locating the SPI for any realistically
APA, Harvard, Vancouver, ISO, and other styles
11

Boggs, Teresa. "Sharing Sensitive Information with Parents: A Guide for Early Childhood Educators." Digital Commons @ East Tennessee State University, 2011. https://dc.etsu.edu/etsu-works/1511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Rubaiy, Hussein Nori. "Allosteric information transfer through inter-subunit contacts in ATP-sensitive potassium channels." Thesis, University of Leicester, 2012. http://hdl.handle.net/2381/11003.

Full text
Abstract:
KATP channels are ubiquitously expressed and link metabolic state to electrical excitability. In heart, in response to ischaemic stress, they play a protective role and in vascular smooth muscle regulation of vascular tone (vasorelaxation). Functional KATP channels are hetero-octamers composed of two subunits, a pore forming Kir6, which is a member of the inwardly rectifying potassium channels family and a regulatory sulphonylurea receptor (SUR). In response to nucleotides and pharmacological agents, SUR allosterically regulate KATP channel gating. Multidisciplinary techniques (molecular biolo
APA, Harvard, Vancouver, ISO, and other styles
13

Yoon, Janghyun. "A network-aware semantics-sensitive image retrieval system." Diss., Available online, Georgia Institute of Technology, 2004:, 2003. http://etd.gatech.edu/theses/available/etd-04082004-180459/unrestricted/yoon%5fjanghyun%5f200312%5fphd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Johnson, Kenneth Tyrone. "The Training Deficiency in Corporate America: Training Security Professionals to Protect Sensitive Information." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4145.

Full text
Abstract:
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect sensitive information. The population consisted of 3 senior leaders in a large telecommunication company located in Dallas, Texas that has a large footprint of securing sensitive information. The conceptual framework on which this study was based was t
APA, Harvard, Vancouver, ISO, and other styles
15

Belkacem, Thiziri. "Neural models for information retrieval : towards asymmetry sensitive approaches based on attention models." Thesis, Toulouse 3, 2019. http://www.theses.fr/2019TOU30167.

Full text
Abstract:
Ce travail se situe dans le contexte de la recherche d'information (RI) utilisant des techniques d'intelligence artificielle (IA) telles que l'apprentissage profond (DL). Il s'intéresse à des tâches nécessitant l'appariement de textes, telles que la recherche ad-hoc, le domaine du questions-réponses et l'identification des paraphrases. L'objectif de cette thèse est de proposer de nouveaux modèles, utilisant les méthodes de DL, pour construire des modèles d'appariement basés sur la sémantique de textes, et permettant de pallier les problèmes de l'inadéquation du vocabulaire relatifs aux représe
APA, Harvard, Vancouver, ISO, and other styles
16

Boggs, Teresa. "Sharing Sensitive Information with Parents: A Guide for Discussing Speech and Language Concerns." Digital Commons @ East Tennessee State University, 2009. https://dc.etsu.edu/etsu-works/1512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Egbert, Matthew. "Adaptation from interactions between metabolism and behaviour : self-sensitive behaviour in protocells." Thesis, University of Sussex, 2012. http://sro.sussex.ac.uk/id/eprint/39564/.

Full text
Abstract:
This thesis considers the relationship between adaptive behaviour and metabolism, using theoretical arguments supported by computational models to demonstrate mechanisms of adaptation that are uniquely available to systems based upon the metabolic organisation of self-production. It is argued how, by being sensitive to their metabolic viability, an organism can respond to the quality of its environment with respect to its metabolic well-being. This makes possible simple but powerful ‘self-sensitive' adaptive behaviours such as “If I am healthy now, keep doing the same as I have been doing – ot
APA, Harvard, Vancouver, ISO, and other styles
18

Strötgen, Jannik [Verfasser], and Michael [Akademischer Betreuer] Gertz. "Domain-sensitive Temporal Tagging for Event-centric Information Retrieval / Jannik Strötgen ; Betreuer: Michael Gertz." Heidelberg : Universitätsbibliothek Heidelberg, 2015. http://d-nb.info/1180395689/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Boggs, Teresa. "Sharing Sensitive Information with Parents: A Guide for Discussing Speech, Language, and Developmental Concerns." Digital Commons @ East Tennessee State University, 2000. https://dc.etsu.edu/etsu-works/1517.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Nilsson, Håkan. "Reliable Communication of Time- and Security-Sensitive Information over a Single Combat Vehicle Network." Thesis, Linköpings universitet, Kommunikationssystem, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-162444.

Full text
Abstract:
A common trend, in general as well as in the field of combat vehicles, is the rapidly increasing demand for data network capacity and even more in transferred data. To handle this increased demand, different countries with their armed forces and equipment manufacturers evaluate methods to increase the data transmission capacity in combat vehicles. The different types of transmitted data are of different criticality and have different security demands. An easy solution to this is to have separated networks for each type of traffic, but that is quite expensive and uses a lot of hardware. This th
APA, Harvard, Vancouver, ISO, and other styles
21

Weatherford, Mark T. "Interpretive analysis of the Joint Maritime Command Information System (JMCIS) Sensitive Compartmented Information (SCI) Local Area Network (LAN) security requirements." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA285529.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, September 1994.<br>Thesis advisor(s): Carl F. Jones, Cynthia E. Irvine. "September 1994." Bibliography: p. 108-112. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
22

Subbiah, Arun. "Efficient Proactive Security for Sensitive Data Storage." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19719.

Full text
Abstract:
Fault tolerant and secure distributed data storage systems typically require that only up to a threshold of storage nodes can ever be compromised or fail. In proactively-secure systems, this requirement is modified to hold only in a time interval (also called epoch), resulting in increased security. An attacker or adversary could compromise distinct sets of nodes in any two time intervals. This attack model is also called the mobile adversary model. Proactively-secure systems require all nodes to "refresh" themselves periodically to a clean state to maintain the availability, integrity, and co
APA, Harvard, Vancouver, ISO, and other styles
23

Sousa, Rita Cristina Pinto de. "Parameter estimation in the presence of auxiliary information." Doctoral thesis, Faculdade de Ciências e Tecnologia, 2013. http://hdl.handle.net/10362/11295.

Full text
Abstract:
Dissertação para obtenção do Grau de Doutora em Estatística e Gestão de Risco, Especialidade em Estatística<br>In survey research, there are many situations when the primary variable of interest is sensitive. The sensitivity of some queries can give rise to a refusal to answer or to false answers given intentionally. Survey can be conducted in a variety of settings, in part dictated by the mode of data collection, and these settings can differ in how much privacy they offer the respondent. The estimates obtained from a direct survey on sensitive questions would be subject to high bias. A va
APA, Harvard, Vancouver, ISO, and other styles
24

Mathew, John. "Disclosure apprehension the influence of media and survey technique on the disclosure of sensitive information /." Online access for everyone, 2008. http://www.dissertations.wsu.edu/Dissertations/Summer2008/j_mathew_043008.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Avranas, Apostolos. "Resource allocation for latency sensitive wireless systems." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT021.

Full text
Abstract:
La nouvelle génération de systèmes de communication sans fil 5G vise non seulement à dépasser le débit de données du prédécesseur (LTE), mais à améliorer le système sur d'autres dimensions. Dans ce but, davantage de classes d'utilisateurs ont été introduites afin de fournir plus de choix de types de service. Chaque classe est un point différent sur le compromis entre le débit de données, la latence et la fiabilité. Maintenant, beaucoup de nouvelles applications, notamment la réalité augmentée, la conduite autonome, l'automatisation de l'industrie et la téléchirurgie, poussent vers un besoin de
APA, Harvard, Vancouver, ISO, and other styles
26

Wimmer, Raphael [Verfasser], and Heinrich [Akademischer Betreuer] Hußmann. "Grasp-sensitive surfaces : utilizing grasp information for human-computer interaction / Raphael Wimmer. Betreuer: Heinrich Hußmann." München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2015. http://d-nb.info/1070762814/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Barboa, Elvia. "The use of a culturally sensitive video in presenting AIDS information to a Hispanic population." Scholarly Commons, 1998. https://scholarlycommons.pacific.edu/uop_etds/2719.

Full text
Abstract:
There is a growing number of Hispanics contracting the AIDS virus. Very little comprehensive culturally sensitive information is available to less acculturated Hispanics. Research has supported that the most effective channel of AIDS information is electronic media. Pamphlets and other print media appear to be an effective source of information for more acculturated literate Hispanics. The present study compared the effectiveness of two videos which differ in cultural sensitivity versus a control group to teach AIDS awareness to less acculturated Hispanics. Ninety (44 males and 46 females) Spa
APA, Harvard, Vancouver, ISO, and other styles
28

Harding, Genevieve E. "Developing methods to access sensitive industrial wastewater information in South Africa (with treatment in mind)." Master's thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29446.

Full text
Abstract:
South Africa is a water stressed country, therefore it is important to understand water use and wastewater generation. Previous research and workshops have identified gaps in the characterisation and remediation of wastewaters in South Africa. Wastewater management can take advantage of wastewater as a valuable resource. However, treatment is required to recover this value, while characterisation is required to develop treatments. Yet wastewater characterisation information is often poorly reported. The nature of industrial wastewaters (in terms of volume, location and composition), and the no
APA, Harvard, Vancouver, ISO, and other styles
29

Thompson, Dale. "Sensitive information an inquiry into the interpretation of information in the workplace from an individual's perspective using qualitative methods / by Dale Thompson." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2008. http://wwwlib.umi.com/cr/syr/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Sledz, Larysa. "A GIS model for environmentally sensitive areas in Delaware County, Indiana." Virtual Press, 2004. http://liblink.bsu.edu/uhtbin/catkey/1294899.

Full text
Abstract:
This study has created a GIS model and comprehensive analysis of environmentally sensitive areas in Delaware County, Indiana. Values were assigned to environmentally sensitive areas for four categories, including woodlands, wetlands, floodplains, and threatened and endangered species. There was an inverse relationship between the size of an area and the environmental sensitivity of the area. These areas occupy twenty-three percent of the total county area. The distribution of these areas is almost equal throughout the county; however, a large portion is located along the banks of the White Riv
APA, Harvard, Vancouver, ISO, and other styles
31

Francis, Anthony G. Jr. "Context-sensitive asynchronous memory : a general experience-based method for managing information access in cognitive agents." Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/9177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Yoong, Ho Liang. "IP services design and implementation in a prototype device for transient tactical access to sensitive information." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/4982.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>In network-centric warfare, access to critical information can result in a strategic advantage. During critical situations, a soldier using tactical devices may need transient access to information beyond their normal clearances. The Least Privilege Separation Kernel (LPSK) being developed at the Naval Postgraduate School, can be the basis of an extended multilevel security (MLS) system that can support and control such access. A Trusted Services Layer (TSL), which depends on the LPSK, provides support for various multilevel securit
APA, Harvard, Vancouver, ISO, and other styles
33

Vega, Laurian. "Security in Practice: Examining the Collaborative Management of Sensitive Information in Childcare Centers and Physicians' Offices." Diss., Virginia Tech, 2011. http://hdl.handle.net/10919/37552.

Full text
Abstract:
Traditionally, security has been conceptualized as rules, locks, and passwords. More recently, security research has explored how people interact in secure (or insecure) ways in part of a larger socio-technical system. Socio-technical systems are comprised of people, technology, relationships, and interactions that work together to create safe praxis. Because information systems are not just technical, but also social, the scope of privacy and security concerns must include social and technical factors. Clearly, computer security is enhanced by developments in the technical arena, where resear
APA, Harvard, Vancouver, ISO, and other styles
34

Murandu, Ngoni. "The extent to which sensitive information is secured by institutions that donate computers to educational settings." Morgantown, W. Va. : [West Virginia University Libraries], 2003. http://etd.wvu.edu/templates/showETD.cfm?recnum=3295.

Full text
Abstract:
Thesis (M.A.)--West Virginia University, 2003.<br>Title from document title page. Document formatted into pages; contains ix, 67 p. Vita. Includes abstract. Includes bibliographical references (p. 53-57).
APA, Harvard, Vancouver, ISO, and other styles
35

Ehlin, Max. "An overview of Product Service System through Integrated Vehicle Health Management in an information sensitive industry." Thesis, Luleå tekniska universitet, Institutionen för ekonomi, teknik och samhälle, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75861.

Full text
Abstract:
Purpose – The research purpose is to enhance knowledge of how organizations can form a PSS through an IVHM system when information is sensitive. Method – A single case study design of abductive approach was used, with data collection through six semi-structured interviews. Findings – A system combining IVHM and PSS has many potential benefits, however there are several challenges that need to be overcome in order to implementing a successful model. Theoretical implications – This study treads a new area not previously explored in the literature when it combines PSS and IVHM, which relies heav
APA, Harvard, Vancouver, ISO, and other styles
36

Ording, Marcus. "Context-Sensitive Code Completion : Improving Predictions with Genetic Algorithms." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205334.

Full text
Abstract:
Within the area of context-sensitive code completion there is a need for accurate predictive models in order to provide useful code completion predictions. The traditional method for optimizing the performance of code completion systems is to empirically evaluate the effect of each system parameter individually and fine-tune the parameters. This thesis presents a genetic algorithm that can optimize the system parameters with a degree-of-freedom equal to the number of parameters to optimize. The study evaluates the effect of the optimized parameters on the prediction quality of the studied code
APA, Harvard, Vancouver, ISO, and other styles
37

Hayden, Angela. "THE DEVELOPMENT OF EXPERT FACE PROCESSING: ARE INFANTS SENSITIVE TO NORMAL DIFFERENCES IN SECOND-ORDER RELATIONAL INFORMATION?" Lexington, Ky. : [University of Kentucky Libraries], 2006. http://lib.uky.edu/ETD/ukypeps2006t00518/Masters.pdf.

Full text
Abstract:
Thesis (M.A.)--University of Kentucky, 2006.<br>Title from document title page (viewed on January 29, 2007). Document formatted into pages; contains: viii, 50 p. : ill. (some col.). Includes abstract and vita. Includes bibliographical references (p. 44-48).
APA, Harvard, Vancouver, ISO, and other styles
38

Gjære, Erlend Andreas. "Sensitive Information on Display : Using flexible de-identification for protecting patient privacy in (semi-) public hospital environments." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-14089.

Full text
Abstract:
In later years, the health care work in hospitals has become increasingly fragmented, in a sense where different people and professions are required for the treatment of every single patient. As a consequence, personnel should be assisted to greater awareness of what is happening, so that they can better plan where to put in their efforts. Making information about ongoing activities more accessible to its users is hence important, but this will in turn require increased distribution of sensitive data inside the hospital. The concept of flexible de-identification has been proposed as a solution
APA, Harvard, Vancouver, ISO, and other styles
39

Engin, Melih. "Text Classificaton In Turkish Marketing Domain And Context-sensitive Ad Distribution." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610457/index.pdf.

Full text
Abstract:
Online advertising has a continuously increasing popularity. Target audience of this new advertising method is huge. Additionally, there is another rapidly growing and crowded group related to internet advertising that consists of web publishers. Contextual advertising systems make it easier for publishers to present online ads on their web sites, since these online marketing systems automatically divert ads to web sites with related contents. Web publishers join ad networks and gain revenue by enabling ads to be displayed on their sites. Therefore, the accuracy of automated ad systems in dete
APA, Harvard, Vancouver, ISO, and other styles
40

Thinyane, Mamello P. "A knowledge-oriented, context-sensitive architectural framework for service deployment in marginalized rural communities." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004843.

Full text
Abstract:
The notion of a global knowledge society is somewhat of a misnomer due to the fact that large portions of the global community are not participants in this global knowledge society which is driven, shaped by and socio-technically biased towards a small fraction of the global population. Information and Communication Technology (ICT) is culture-sensitive and this is a dynamic that is largely ignored in the majority of ICT for Development (ICT4D) interventions, leading to the technological determinism flaw and ultimately a failure of the undertaken projects. The deployment of ICT solutions, in p
APA, Harvard, Vancouver, ISO, and other styles
41

Lang, Martin. "Secure Automotive Ethernet : Balancing Security and Safety in Time Sensitive Systems." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18235.

Full text
Abstract:
Background.As a result of the digital era, vehicles are being digitalised in arapid pace. Autonomous vehicles and powerful infotainment systems are justparts of what is evolving within the vehicles. These systems require more in-formation to be transferred within the vehicle networks. As a solution for this,Ethernet was suggested. However, Ethernet is a ’best effort’ protocol which cannot be considered reliable. To solve that issue, specific implementations weredone to create Automotive Ethernet. However, the out-of-the-box vulnerabil-ities from Ethernet persist and need to be mitigated in a w
APA, Harvard, Vancouver, ISO, and other styles
42

Brox, Elin Anette. "Information Security in Distribued Health Information Systems in Scandinavia : A Comparative Study of External Conditions and Solutions for Exchange and Sharing of Sensitive Health Information in Denmark, Norway and Sweden." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9469.

Full text
Abstract:
<p>Exchange and sharing of sensitive health information have to happen according to prevailing external conditions established by laws, regulations and liable authorities. These external conditions create various limitations, making requests for adaptative health information systems. Especially, when developing new solutions, defining the balance between protection of personal privacy and availability of information, is a great challenge. Several projects are working on possible solutions to the problem of sharing health information in a distributed way. Based on two different pilot projects
APA, Harvard, Vancouver, ISO, and other styles
43

Ljungberg, Lucas. "Using unsupervised classification with multiple LDA derived models for text generation based on noisy and sensitive data." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-255010.

Full text
Abstract:
Creating models to generate contextual responses to input queries is a difficult problem. It is even more difficult when available data contains noise and sensitive data. Finding models or methods to handle such issues is important in order to use data for productive means.This thesis proposes a model based on a cooperating pair of Topic Models of differing tasks (LDA and GSDMM) in order to alleviate the problematic properties of data. The model is tested on a real-world dataset with these difficulties as well as a dataset without them. The goal is to 1) look at the behaviour of the different
APA, Harvard, Vancouver, ISO, and other styles
44

Skoglund, Caroline. "Risk-aware Autonomous Driving Using POMDPs and Responsibility-Sensitive Safety." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-300909.

Full text
Abstract:
Autonomous vehicles promise to play an important role aiming at increased efficiency and safety in road transportation. Although we have seen several examples of autonomous vehicles out on the road over the past years, how to ensure the safety of autonomous vehicle in the uncertain and dynamic environment is still a challenging problem. This thesis studies this problem by developing a risk-aware decision making framework. The system that integrates the dynamics of an autonomous vehicle and the uncertain environment is modelled as a Partially Observable Markov Decision Process (POMDP). A risk m
APA, Harvard, Vancouver, ISO, and other styles
45

Nightingale, Sarah. "Culturally sensitive and community-based HIV/AIDS prevention messages for African American women." Thesis, Manhattan, Kan. : Kansas State University, 2008. http://hdl.handle.net/2097/813.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Sadler, Pauline Barbara. "Balancing the public interest: The D-Notice system and the suppression of sensitive government information relating to national security." Thesis, Sadler, Pauline Barbara (1999) Balancing the public interest: The D-Notice system and the suppression of sensitive government information relating to national security. PhD thesis, Murdoch University, 1999. https://researchrepository.murdoch.edu.au/id/eprint/51263/.

Full text
Abstract:
Balancing the public interest: the D-Notice system and the suppression of sensitive government information relating to national security The D-Notice system is a voluntary arrangement between the government and the media where the media agree not to publish certain information in the interests of national security. The D-Notice system operates only in Australia and the U.K. and is now known as the DA-Notice system in the U.K. It represents voluntary censorship on the part of the media. The alternative to the D-Notice system is legal action by the government to suppress allegedly sensitive m
APA, Harvard, Vancouver, ISO, and other styles
47

Kini, Ananth Ullal. "On the effect of INQUERY term-weighting scheme on query-sensitive similarity measures." Texas A&M University, 2005. http://hdl.handle.net/1969.1/3116.

Full text
Abstract:
Cluster-based information retrieval systems often use a similarity measure to compute the association among text documents. In this thesis, we focus on a class of similarity measures named Query-Sensitive Similarity (QSS) measures. Recent studies have shown QSS measures to positively influence the outcome of a clustering procedure. These studies have used QSS measures in conjunction with the ltc term-weighting scheme. Several term-weighting schemes have superseded the ltc term-weighing scheme and demonstrated better retrieval performance relative to the latter. We test whether introducing one
APA, Harvard, Vancouver, ISO, and other styles
48

Lindberg, Susanne. "Involving Children in the Design of Online Peer Support for Children with Cancer." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4528.

Full text
Abstract:
Information Technology (IT) in health services has become increasingly important for people&apos;s wellbeing. The nature of design of these technologies is complex – even more so when the context is of a sensitive nature, such as the user&apos;s health. Furthermore, when the users are children, several additional difficulties surface. Apart from the design context being sensitive, children have cognitive and communicational limitations that make any design method employed require adaptations. This thesis is conducted within the research project Child Health Interactive Peer Support (CHIPS) at
APA, Harvard, Vancouver, ISO, and other styles
49

Renshaw, K. J. "Semi-natural vegetation characteristics and the prediction of hydrological and hydrochemical information within moorland, acid-sensitive catchments in upland Wales." Thesis, Swansea University, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.638645.

Full text
Abstract:
This study investigates the potential of utilizing semi-natural vegetation characteristics to predict hydrological and hydrochemical source areas in upland moorland catchments. It centres upon the intensive vegetational, hydrological and hydrochemical investigation of the Nant Gruffydd catchment, a tributary of the Camddwr at Llyn Brianne in upland, mid-Wales. A nested catchment approach was adopted and intensive monitoring during baseflows and stormflows was used to establish hydrological and hydrochemical source areas at stages through the storm hydrograph. The hydrological points raised inc
APA, Harvard, Vancouver, ISO, and other styles
50

BELIAN, Rosalie Barreto. "A context-based name resolution approach for semantic schema integration." Universidade Federal de Pernambuco, 2008. https://repositorio.ufpe.br/handle/123456789/1512.

Full text
Abstract:
Made available in DSpace on 2014-06-12T15:50:47Z (GMT). No. of bitstreams: 2 arquivo1988_1.pdf: 1433897 bytes, checksum: 2bd67eddaeadba13aa380ec5c913b7e0 (MD5) license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2008<br>Uma das propostas da Web Semântica é fornecer uma grande diversidade de serviços de diferentes domínios na Web. Estes serviços são, em sua maioria, colaborativos, cujas tarefas se baseiam em processos de tomada de decisão. Estas decisões, por sua vez, serão mais bem embasadas se considerarem a maior quantidade possível de infor
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!