Although superstores can help visually impaired customers with their in-store shopping, they cannot help them identify the products after the customers take them home. We designed a QR-Label and realized an on-demand ...
详细信息
In several cases, the spectral properties of objects change and depend on the viewing angle. Some example of this kind of samples can be found in the printing industry where special effect coatings are used to obtain ...
详细信息
Collaboration Engineering (CE) is a new and growing field of research and practice which involves the designing of recurring collaboration processes that are meant to cause predictable and success among organizations&...
详细信息
The inverse and reverse counterparts of the single-machine scheduling problem 1||Lmax are studied in [2], in which the complexity classification is provided for various combinations of adjustable parameters (due dates...
详细信息
Privacy risks have been addressed through technical solutions such as Privacy-Enhancing Technologies (PETs) as well as regulatory measures including Do Not Track. These approaches are inherently limited as they are gr...
详细信息
ISBN:
(纸本)9781479909308
Privacy risks have been addressed through technical solutions such as Privacy-Enhancing Technologies (PETs) as well as regulatory measures including Do Not Track. These approaches are inherently limited as they are grounded in the paradigm of a rational end user who can determine, articulate, and manage consistent privacy preferences. This assumes that self-serving efforts to enact privacy preferences lead to socially optimal outcomes with regard to information sharing. We argue that this assumption typically does not hold true. Consequently, solutions to specific risks are developed -- even mandated -- without effective reduction in the overall harm of privacy breaches. We present a systematic framework to examine these limitations of current technical and policy solutions. To address the shortcomings of existing privacy solutions, we argue for considering information sharing to be transactions within a community. Outcomes of privacy management can be improved at a lower overall cost if peers, as a community, are empowered by appropriate technical and policy mechanisms. Designing for a community requires encouraging dialogue, enabling transparency, and supporting enforcement of community norms. We describe how peer production of privacy is possible through PETs that are grounded in the notion of information as a common-pool resource subject to community governance.
Microbial interaction, such as species competition and symbiotic relationships, plays important role to enable microorganisms to survive by establishing a homeostasis between microbial neighbors and local environments...
详细信息
Microbial interaction, such as species competition and symbiotic relationships, plays important role to enable microorganisms to survive by establishing a homeostasis between microbial neighbors and local environments. Thanks to the recent accumulation of large-scale high-throughput sequencing data of complex microbial communities, there are increasing interests in identifying microbial interactions. Computational methods for microbial interactions inference are currently focused on the similarity among microbial individuals (i.e. cooccurrence and correlation patterns), however, less methods considered the dynamics of a single complex community over time. In this paper, we propose to use a multivariate statistical method - Multivariate Vector Autoregression (MVAR) to infer dynamic microbial interactions from the time series of human gut microbiomes. Specifically, we apply MVAR model on a time series data of human gut microbiomes which were treated with repeated antibiotics. The referred microbial interactions identify novel interactions which may provide a novel complementary to similarity or correlation-based methods.
Due to the rapid development of information technology, many firms have already or plan to move from traditional service to electronic environment. One of the important factor issues which need to be considered is the...
详细信息
Due to the rapid development of information technology, many firms have already or plan to move from traditional service to electronic environment. One of the important factor issues which need to be considered is the user acceptance of e-service technology. In order to evaluate the adoption of web based information technology, it is vital to release the users' needs. Therefore, the diversity of Web based service user types need to be recognized. This paper is going to classify the e-service users based on their experience, purpose of usage and geographical place.
This paper examines the importance of trust factors in the development and adoption of internet based cultural information systems. The proposed trust model identifies the relationship between user communication goals...
详细信息
The internet has accelerated access to and sharing of electronic medical records (EMR). EMRs are meant to be confidential and only accessed or shared with authorization from the owner. A combination of UserID and a Pa...
详细信息
暂无评论