Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,166,817 papers from all fields of science
Search
Sign In
Create Free Account
Privacy
Known as:
Right Of Privacy
, Privacy right
, Personal privacy
Expand
Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Activity tracker
American Libraries
Business process interoperability
CUPS (CMU)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Development of RNA profiling tools and the implementation in forensic casework
P. A. Lindenbergh
2014
Corpus ID: 28383818
In this thesis we have explored the use of mRNA profiling applications as tools for human body fluids and organ tissue…
Expand
Highly Cited
2012
Highly Cited
2012
Enabling pervasive healthcare through continuous remote health monitoring
Xiaohui Liang
,
Mrinmoy Barua
,
+4 authors
Henry Y. Luo
IEEE wireless communications
2012
Corpus ID: 11692889
In this article, we introduce a novel remote health monitoring (RHM) system to enable high-quality pervasive healthcare services…
Expand
Highly Cited
2011
Highly Cited
2011
Scalable RFID security protocols supporting tag ownership transfer
Boyeon Song
,
C. Mitchell
Computer Communications
2011
Corpus ID: 825171
Highly Cited
2011
Highly Cited
2011
Implementation of terminal middleware platform for mobile RFID computing
Namje Park
International Journal of Ad Hoc and Ubiquitous…
2011
Corpus ID: 13639317
The typical Radio Frequency Identification (RFID) architecture, defined by EPCglobal, comprises RFID tags, which are embedded or…
Expand
Highly Cited
2008
Highly Cited
2008
SVATS: A Sensor-Network-Based Vehicle Anti-Theft System
Hui Song
,
Sencun Zhu
,
G. Cao
IEEE INFOCOM - The 27th Conference on Computer…
2008
Corpus ID: 3099246
Today vehicle theft rate is very high, thus tracking/alarming systems are being deployed with an increasingly popularity. These…
Expand
Highly Cited
2006
Highly Cited
2006
A confidence-based framework for business to consumer (B2C) mobile commerce adoption
Y. Wong
,
Chao-Jung Hsu
Personal and Ubiquitous Computing
2006
Corpus ID: 11027817
The Technology Acceptance Model (TAM) has been considered to be fundamental in determining the acceptance of new technology in…
Expand
Highly Cited
2005
Highly Cited
2005
ACAI: agent-based context-aware infrastructure for spontaneous applications
Mohamed Khedr
,
A. Karmouch
Journal of Network and Computer Applications
2005
Corpus ID: 9107504
Highly Cited
2004
Highly Cited
2004
Mobility Prediction in Wireless Networks using Neural Networks
J. Capka
,
R. Boutaba
IFIP/IEEE International Conference on Management…
2004
Corpus ID: 7516491
Wireless network resource use depends in large part on the mobility of network users. The ability to predict this mobility at…
Expand
Highly Cited
2003
Highly Cited
2003
WebGIS for Monitoring "Sudden Oak Death" in coastal California
N. M. Kelly
,
K. Tuxen
Computers, Environment and Urban Systems
2003
Corpus ID: 36795199
Highly Cited
1997
Highly Cited
1997
Interface transparency of superconductor/ferromagnetic multilayers
J. Aarts
,
J. Geers
,
E. Brück
,
A. Golubov
,
R. Coehoorn
1997
Corpus ID: 20393575
We have investigated the behavior of the superconducting transition temperature ${T}_{c}$ in superconducting/ferromagnetic (S/F…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE