X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (16166) 16166
Newspaper Article (4734) 4734
Patent (3200) 3200
Government Document (2426) 2426
Report (1870) 1870
Publication (1569) 1569
Magazine Article (752) 752
Book Chapter (739) 739
Conference Proceeding (682) 682
Trade Publication Article (431) 431
Newsletter (285) 285
Dissertation (146) 146
Book / eBook (121) 121
Book Review (85) 85
Reference (52) 52
Web Resource (51) 51
Transcript (39) 39
Paper (19) 19
Data Set (2) 2
Electronic Resource (2) 2
Presentation (2) 2
Archival Material (1) 1
Library Holding (1) 1
Market Research (1) 1
Technical Report (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
humans (7824) 7824
index medicus (6074) 6074
female (5370) 5370
male (5031) 5031
adult (3724) 3724
physics (3325) 3325
counting (3183) 3183
computing (3181) 3181
calculating (3178) 3178
middle aged (3004) 3004
statistical data (2861) 2861
analysis (2344) 2344
adolescent (2310) 2310
research (2275) 2275
studies (2171) 2171
aged (2021) 2021
databases (1909) 1909
electric digital data processing (1725) 1725
data processing systems or methods, specially adapted foradministrative, commercial, financial, managerial, supervisoryor forecasting purposes (1680) 1680
systems or methods specially adapted for administrative,commercial, financial, managerial, supervisory or forecastingpurposes, not otherwise provided for (1680) 1680
data collection (1668) 1668
public, environmental & occupational health (1633) 1633
young adult (1600) 1600
risk factors (1477) 1477
data security (1470) 1470
public health (1335) 1335
electricity (1235) 1235
electric communication technique (1178) 1178
education (1174) 1174
data integrity (1099) 1099
prevalence (1096) 1096
data encryption (1092) 1092
socioeconomic factors (1089) 1089
surveys and questionnaires (1083) 1083
psychiatry (1071) 1071
data bases (1067) 1067
research article (1062) 1062
management (1036) 1036
computer science (1024) 1024
cross-sectional studies (1011) 1011
molecular sequence data (1011) 1011
laws, regulations and rules (1004) 1004
united states (1001) 1001
usage (979) 979
children (971) 971
corporate profiles (964) 964
child (963) 963
data processing (954) 954
animals (946) 946
privacy (939) 939
medicine (924) 924
transmission of digital information, e.g. telegraphiccommunication (907) 907
health aspects (888) 888
methods (881) 881
risk (880) 880
industrywide conditions (872) 872
women (848) 848
retrospective studies (840) 840
data analysis (827) 827
mortality (806) 806
health (787) 787
aged, 80 and over (784) 784
population (782) 782
prevention (779) 779
statistics (779) 779
internet (732) 732
article (727) 727
law enforcement (724) 724
adherence (692) 692
cloud computing (689) 689
computer security (681) 681
epidemiology (679) 679
behavior (673) 673
science (663) 663
multidisciplinary sciences (658) 658
substance abuse (655) 655
phylogeny (651) 651
medicine & public health (639) 639
medication adherence - statistics & numerical data (636) 636
acquisitions & mergers (612) 612
medicine, general & internal (611) 611
trends (611) 611
violence (591) 591
drugs (590) 590
regression analysis (584) 584
statistical data: government (582) 582
crime (573) 573
surveys (571) 571
patient compliance (568) 568
swot analysis (565) 565
capital formation (556) 556
securities analysis (551) 551
child, preschool (549) 549
medication adherence (546) 546
agriculture (542) 542
business forecasts (541) 541
venture capital (540) 540
private equity (534) 534
industry analysis (532) 532
market analysis (532) 532
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Engineering & Comp. Sci. - Stacks (12) 12
Robarts - Stacks (11) 11
Gerstein Science - Stacks (8) 8
Law (Bora Laskin) - Stacks (7) 7
Collection Dvlpm't (Acquisitions) - Vendor file (6) 6
UofT at Scarborough - Stacks (5) 5
UTL at Downsview - May be requested (4) 4
Media Commons - Microtexts (3) 3
UofT at Mississauga - Stacks (3) 3
Collection Dvlpm't (Acquisitions) - Closed Orders (2) 2
Faculty of Information - Stacks (2) 2
Law (Bora Laskin) - Theses (2) 2
Online Resources - Online (2) 2
Richard Charles Lee Canada-Hong Kong - Library use only (2) 2
Astronomy & Astrophysics - Ask at library (1) 1
Earth Sciences (Noranda) - Circulation Desk (1) 1
Markham Stouffville Hospital - Stacks (1) 1
OISE - Theses (1) 1
Scarborough Hospital - General (1) 1
St. Michael's College (John M. Kelly) - 2nd Floor (1) 1
Sunnybrook Health Sciences Centre - Sunnybrook Stacks (1) 1
Trillium Health Centre - Stacks (1) 1
Trinity College (John W Graham) - Stacks (1) 1
University College (Laidlaw) - Stacks (1) 1
Victoria University E.J. Pratt - Stacks (1) 1
West Park Healthcare Centre - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (30830) 30830
French (967) 967
German (273) 273
Korean (231) 231
Japanese (182) 182
Chinese (156) 156
Spanish (56) 56
Portuguese (26) 26
Russian (24) 24
Italian (8) 8
Norwegian (8) 8
Danish (6) 6
Dutch (5) 5
Arabic (2) 2
Croatian (2) 2
Czech (2) 2
Hebrew (2) 2
Hungarian (2) 2
Icelandic (2) 2
Swedish (2) 2
Turkish (2) 2
Urdu (2) 2
Afrikaans (1) 1
Hindi (1) 1
Slovak (1) 1
Slovenian (1) 1
Ukrainian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


ACM Transactions on Information and System Security (TISSEC), ISSN 1094-9224, 04/2015, Volume 17, Issue 4, pp. 1 - 29
Journal Article
ACM Transactions on Information and System Security (TISSEC), ISSN 1094-9224, 05/2011, Volume 14, Issue 1, pp. 1 - 34
Journal Article
Proceedings of the 16th ACM conference on computer and communications security, ISSN 1543-7221, 11/2009, pp. 213 - 222
We consider the problem of efficiently proving the integrity of data stored at untrusted servers. In the provable data possession (PDP) model, the client... 
skip list | integrity checking | outsourced storage | proof of retrievability | provable data possession | authenticated data structures | authentication | Outsourced storage | Authenticated data structures | Authentication | Proof of retrievability | Provable data possession | Integrity checking | Skip list
Conference Proceeding
PLoS ONE, ISSN 1932-6203, 07/2017, Volume 12, Issue 7, p. e0179953
Journal Article
Addiction, ISSN 0965-2140, 01/2019, Volume 114, Issue 1, pp. 92 - 100
Aims To examine uptake following a large‐scale naloxone programme by estimating distribution rates since programme initiation and the proportion among a sample... 
overdose prevention | Naloxone | opioid overdose | naloxone possession | naloxone distribution | people who inject drugs | MORTALITY | OPIATE-OVERDOSE | PSYCHIATRY | PATTERNS | SUBSTANCE ABUSE | DEATHS | TAKE-HOME NALOXONE | DRUG-USERS | PERIOD | NONFATAL HEROIN OVERDOSE | COHORT | Homeless Persons - statistics & numerical data | Drug Overdose - drug therapy | Heroin Dependence - drug therapy | Drug Trafficking - statistics & numerical data | Humans | Middle Aged | Substance Abuse, Intravenous - epidemiology | Analgesics, Opioid - poisoning | Nasal Sprays | Opiate Substitution Treatment - statistics & numerical data | Logistic Models | Male | Naloxone - therapeutic use | Heroin Dependence - epidemiology | Likelihood Functions | Narcotic Antagonists - therapeutic use | Norway - epidemiology | Sex Factors | Adult | Female | Drugs | Homelessness | Analysis | Opioids | Respiratory agents | Substance abuse | Overdose | Drug abuse | Drug delivery systems | Substance abuse treatment | Shelters | Illegal | Sprays | Risk | Training | Confidence intervals | Regression models | Stimulants | Urban health care | Indicators | Heroin | Quantitative analysis | Statistical analysis | Narcotics | Saturation | Medical treatment | Sprayers | Regression analysis | Nasal sprays | Uptake | Substance use | Cities | Imprisonment | Research Report | Research Reports
Journal Article
Natural Language Engineering, ISSN 1351-3249, 07/2018, Volume 24, Issue 4, pp. 589 - 610
Just as industrialization matured from mass production to customization and personalization, so has the Web migrated from generic content to public disclosures... 
LANGUAGE & LINGUISTICS | LINGUISTICS | NETWORKS | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | Confidence intervals | Mass production | Demographics | Possession | Computer engineering | Natural language | Computational linguistics | Data mining | Artificial intelligence
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 05/2017, Volume 12, Issue 5, pp. 1182 - 1194
Provable data possession (PDP) allows a user to outsource data with a guarantee that the integrity can be efficiently verified. Existing publicly verifiable... 
Cloud computing | Handheld computers | online/offline signature | Public key | Metadata | cloud storage | chameleon hash | data outsourcing | Outsourcing | Provable data possession | Servers | SIGNATURE SCHEMES | LINE SIGNATURES | CLOUD | COMPUTER SCIENCE, THEORY & METHODS | RETRIEVABILITY | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
IEEE Transactions on Services Computing, ISSN 1939-1374, 03/2015, Volume 8, Issue 2, pp. 328 - 340
Remote data integrity checking is of crucial importance in cloud storage. It can make the clients verify whether their outsourced data is kept intact without... 
Cloud computing | Protocols | Computational modeling | Distributed databases | provable data possession | bilinear pairings | Servers | Security | Indexes | distributed computing | identity-based cryptography | COMPUTER SCIENCE, SOFTWARE ENGINEERING | PROOFS | COMPUTER SCIENCE, INFORMATION SYSTEMS | Data integrity | Computer security
Journal Article
IEEE Transactions on Parallel and Distributed Systems, ISSN 1045-9219, 12/2012, Volume 23, Issue 12, pp. 2231 - 2244
Journal Article
Journal of Sports Sciences, ISSN 0264-0414, 01/2013, Volume 31, Issue 2, pp. 123 - 136
Possession is thought of as central to success in modern football, but questions remain about its impact on positive team outcomes (Bate, 1988; Hughes &... 
association football | possession | match analysis | Group Processes | Athletic Performance - standards | Data Interpretation, Statistical | Time Factors | Europe | Humans | Achievement | Soccer - statistics & numerical data | Databases, Factual
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 03/2015, Volume 10, Issue 3, pp. 485 - 497
Journal Article
Proceedings of the 14th ACM conference on computer and communications security, ISSN 1543-7221, 10/2007, pp. 598 - 609
We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses... 
archival storage | homorphic verifiable tags | provable data possession | pdp | storage security | Storage security | Provable data possession | PDP | Homomorphic verifiable tags | Archival storage
Conference Proceeding
Future Generation Computer Systems, ISSN 0167-739X, 09/2013, Volume 29, Issue 7, pp. 1709 - 1715
Cloud storage enables users to access their data anywhere and at any time. It also can comply with a growing number of regulations. However, it brings about... 
Storage security | Remote data possession checking | Algebraic signature | Cloud storage | COMPUTER SCIENCE, THEORY & METHODS | PROOFS
Journal Article
Journal of the American Statistical Association, ISSN 0162-1459, 04/2016, Volume 111, Issue 514, pp. 585 - 599
Basketball games evolve continuously in space and time as players constantly interact with their teammates, the opposing team, and the ball. However, current... 
Competing risks | Gaussian process | Spatiotemporal model | Optical tracking data | STATISTICS & PROBABILITY | PARTIAL LIKELIHOOD | INFERENCE
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 11/2015, Volume 52, pp. 77 - 85
Cloud storage allows users to enjoy the on-demand and high quality data storage services without the load of local data maintenance. However, the cloud server... 
Provable security | Data integrity | Algebraic signature | Cloud storage | PROOFS | INTEGRITY VERIFICATION | COMPUTER SCIENCE, THEORY & METHODS | EFFICIENT
Journal Article