Showing 321 - 340 results of 2,128 for search '"data access"', query time: 0.45s Refine Results
  1. 321

    A big data placement method using NSGA-III in meteorological cloud platform by Feng Ruan, Renhao Gu, Tao Huang, Shengjun Xue

    Published 2019-06-01
    “…First, the resource utilization, the data access time, and the energy consumption in MCP with the fat-tree topology are analyzed. …”
    Get full text
    Article
  2. 322

    A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing by Yichen Hou, Sahil Garg, Lin Hui, Dushantha Nalin K. Jayakody, Rui Jin, M. Shamim Hossain

    Published 2020-01-01
    “…Therefore, access control, as an important method to ensure the security of user data during data access, began to be applied to mobile edge computing. …”
    Get full text
    Article
  3. 323

    Beyond Legal Frameworks and Security Controls For Accessing Confidential Survey Data: Engaging Data Users in Data Protection by Amy Pienta, Joy Jang, Margaret Levenstein

    Published 2023-12-01
    “…Unintentional data breaches, protocol violations, and the misuse of data are observed even in well-established restricted data access systems, which indicates that the systems all may rely heavily on trust. …”
    Get full text
    Article
  4. 324

    d-EMR: Secure and distributed Electronic Medical Record management by Ehab Zaghloul, Tongtong Li, Jian Ren

    Published 2023-03-01
    “…As more and more data is produced, finding a secure and efficient data access structure has become a major research issue. …”
    Get full text
    Article
  5. 325

    The Dementias Platform UK (DPUK) data portal by Bauermeister, S, Orton, C, Thompson, S, Bauermeister, JR, Calvin, C, Denis, M, Hu, MT, Jindra, C, Kim, C-H, Koychev, I, Mackay, C, Wade-Martins, R, Gallacher, JEJ

    Published 2020
    “…Projects are varied including multi-modal, machine learning, and Mendelian randomisation analyses. Data access is usually free at point of use although a small number of cohorts require a data access fee.…”
    Journal article
  6. 326

    Flash Cache Hybrid Storage System For Video-On-Demand Server by Al-Wasabi, Ola Ahmed Mohammed

    Published 2018
    “…This component consists of HDD, SSD, and RAM, collectively fulfilling the requirement of simultaneous fast data access and large data distribution to numerous users. …”
    Get full text
    Thesis
  7. 327

    Improving Information Storage Reliability Using a Data Network by Benjamin, Arthur J.

    Published 2023
    “…Although data transfer rates will be reduced, data access and management will be simplified, and system availability will be improved. …”
    Get full text
  8. 328

    Researcher Credentialing for Administrative Data: Easing the Burden, Increasing the Efficiency by Allison R.B. Tyler, Johanna Davidson Bleckman, Margaret C. Levenstein

    Published 2018-10-01
    “…We describe these standards, how they fit into the repository workflow, and how they make the data access process for efficient and effective for administrative data users and providers.…”
    Get full text
    Article
  9. 329

    Multi-authority Access Control Scheme in Cloud Environment by ZHENG Lianghan, HE Heng, TONG Qian, YANG Xiang, CHEN Xiang

    Published 2020-11-01
    “…This paper proposes a cloud data access control scheme based on blockchain with multi-authority (BMAC). …”
    Get full text
    Article
  10. 330

    Building a Canadian Data Platform under the Strategy for Patient-Oriented Research by Kimberlyn McGrail

    Published 2019-11-01
    “…Results Our Data Access Support Hub will open in the fall of 2019, at which time we will have an inventory of data available across our network, and the beginnings of a catalog of algorithms and harmonized data. …”
    Get full text
    Article
  11. 331

    The ORFEUS Data Center by B. Dost

    Published 1994-06-01
    “…Key issues for the ODC are the rapid on-line data access and quality controlled, complete and efficient off-line data access. …”
    Get full text
    Article
  12. 332

    The Working Group III on data exchange by B. Dost

    Published 1994-06-01
    “…Key issues for the ODC are the rapid on-line data access and quality controlled, complete and efficient off-line data access. …”
    Get full text
    Article
  13. 333

    A noise-based privacy preserving model for Internet of Things by Shelendra Kumar Jain, Nishtha Kesswani

    Published 2021-08-01
    “…The proposed model with the fuzzifier has around 48–73% less computational overhead compared to the Data access control scheme and 31–63% less computational overhead compared to the Dynamic Privacy Protection model. …”
    Get full text
    Article
  14. 334

    ADSM: Adaptive Data Scheduling Method for Hybrid Memories in Distributed System by Jiazhao Sun, Yunchun Li, Hailong Yang, Wei Li

    Published 2019-01-01
    “…The SP-factor incorporates the data access patterns including data block size and data access parallelism, which leads to better data scheduling decision for higher performance. …”
    Get full text
    Article
  15. 335

    Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment by M. Suganya, T. Sasipraba

    Published 2023-05-01
    “…In the data access phase, cloud data access is managed by authenticating the authorized user with the Blowfish encryption algorithm. …”
    Get full text
    Article
  16. 336

    Public views and recommendations on the use of linked data for research: preliminary results from a public deliberation engagement by Jack Teng, Kim McGrail, Colene Bentley, Michael Burgess, Kieran O'Doherty

    Published 2018-09-01
    “…Conclusion/Implications Changes in available data and increasing ability to link data makes it essential to include public views in systems of data access governance. Understanding the hopes and concerns of the public regarding the use of linked data for research will help develop data access regulations that reflect wide public interests.…”
    Get full text
    Article
  17. 337

    The privacy and control paradoxes in the context of smartphone apps by Vanessa Ayres-Pereira, Angelo Pirrone, Angelo Pirrone, Max Korbmacher, Ingvar Tjostheim, Gisela Böhm, Gisela Böhm

    Published 2022-09-01
    “…This research examines how various factors, such as the degree of e-privacy concerns and control over data access permissions, can influence a user's intention to install a smartphone app. …”
    Get full text
    Article
  18. 338

    Cloud-based biomedical data storage and analysis for genomic research: Landscape analysis of data governance in emerging NIH-supported platforms by Jacklyn M. Dahlquist, Sarah C. Nelson, Stephanie M. Fullerton

    Published 2023-07-01
    “…Platform policies were compared across seven categories of data governance: data submission, data ingestion, user authentication and authorization, data security, data access, auditing, and sanctions. Our analysis finds similarities across the platforms, including reliance on a formal data ingestion process, multiple tiers of data access with varying user authentication and/or authorization requirements, platform and user data security measures, and auditing for inappropriate data use. …”
    Get full text
    Article
  19. 339

    Nothing Else Matters! Trade-Offs Between Perceived Benefits and Barriers of AAL Technology Usage by Julia Offermann-van Heek, Martina Ziefle

    Published 2019-06-01
    “…For care novices, in contrast, data access should be in the exclusive responsibility of medical professionals. …”
    Get full text
    Article
  20. 340

    Integrated platform and API for electrophysiological data by Andrey eSobolev, Adrian eStoewer, Aljoscha Pascal Leonhardt, Philipp L. Rautenberg, Christian Johannes Kellner, Christian eGarbers, Thomas eWachtler

    Published 2014-04-01
    “…The rapid data growth has made efficient data access and flexible, machine-readable data annotation a crucial requisite for neuroscientists. …”
    Get full text
    Article