Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 221,472,022 papers from all fields of science
Search
Sign In
Create Free Account
Privacy
Known as:
Right Of Privacy
, Privacy right
, Personal privacy
Expand
Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Activity tracker
American Libraries
Business process interoperability
CUPS (CMU)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Development of RNA profiling tools and the implementation in forensic casework
P. A. Lindenbergh
2014
Corpus ID: 28383818
In this thesis we have explored the use of mRNA profiling applications as tools for human body fluids and organ tissue…
Expand
Highly Cited
2012
Highly Cited
2012
Cloud networked robotics
Koji Kamei
,
S. Nishio
,
N. Hagita
,
Miki Sato
IEEE Network
2012
Corpus ID: 16354025
This article proposes a new field of research called Cloud Networked Robotics, which tackles the issues for supporting daily…
Expand
Highly Cited
2012
Highly Cited
2012
Enabling pervasive healthcare through continuous remote health monitoring
Xiaohui Liang
,
Mrinmoy Barua
,
+4 authors
Henry Y. Luo
IEEE wireless communications
2012
Corpus ID: 11692889
In this article, we introduce a novel remote health monitoring (RHM) system to enable high-quality pervasive healthcare services…
Expand
Highly Cited
2011
Highly Cited
2011
Scalable RFID security protocols supporting tag ownership transfer
Boyeon Song
,
C. Mitchell
Computer Communications
2011
Corpus ID: 825171
Highly Cited
2009
Highly Cited
2009
Identities in the Future Internet of Things
A. Sarma
,
J. Girão
Wireless personal communications
2009
Corpus ID: 8677745
There are two problem areas of the current Internet to be solved in Future Internet scenarios—security and putting the user back…
Expand
Highly Cited
2008
Highly Cited
2008
Secure Location Verification with Hidden and Mobile Base Stations
Srdjan Capkun
,
Kasper Bonne Rasmussen
,
Mario Cagalj
,
M. Srivastava
IEEE Transactions on Mobile Computing
2008
Corpus ID: 2445867
In this work, we propose and analyze a new approach for securing localization and location verification in wireless networks…
Expand
Highly Cited
2007
Highly Cited
2007
Privacy in Video Surveillance
A. Cavallaro
2007
Corpus ID: 130814665
“people google” scenario possible. People search engines like Zabasearch can be extended to enable the input of passport pictures…
Expand
Highly Cited
2004
Highly Cited
2004
Mobility Prediction in Wireless Networks using Neural Networks
J. Capka
,
R. Boutaba
IFIP/IEEE International Conference on Management…
2004
Corpus ID: 7516491
Wireless network resource use depends in large part on the mobility of network users. The ability to predict this mobility at…
Expand
Highly Cited
1997
Highly Cited
1997
Interface transparency of superconductor/ferromagnetic multilayers
J. Aarts
,
J. Geers
,
E. Brück
,
A. Golubov
,
R. Coehoorn
1997
Corpus ID: 20393575
We have investigated the behavior of the superconducting transition temperature ${T}_{c}$ in superconducting/ferromagnetic (S/F…
Expand
Review
1990
Review
1990
Using appropriate experimental designs for intended hypotheses in ‘song’ playbacks, with examples for testing effects of song repertoire sizes
D. Kroodsma
Animal Behaviour
1990
Corpus ID: 53156019
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE