Funding of a System of Key Registers Mbbl-2012
2 characteristics of 21 st century learning
Struts presentation 1
Euroalert
Securityofdata
Patterns of Enterprise Application Architecture
Simple testable code
Herding Ponies: How big data methods facilitate collaborative analytics.
PDM Workshop April 8, 2006 Deriving Private Information from Perturbed Data Using IQR-based Approach Songtao Guo UNC Charlotte Xintao Wu UNC Charlotte.
Protecting Privacy when Disclosing Information Pierangela Samarati Latanya Sweeney.
Privacy and Security Tiger Team Today’s Discussion: Query/Response Models for Health Information Exchange January 24, 2013.
Privacy and Security Tiger Team