Results 141 to 150 of about 9,078 (172)
Some of the next articles are maybe not open access.
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2010
Traffic gatekeeping, typically implemented using firewalls, is an essential functionality in today's networked computing systems such as desktop PCs. Traffic gatekeeping provides protection against a variety of over-the-network security attacks and can also be used to implement various communication resource management policies. With the development of
Mohammad Sajjad Hossain +1 more
openaire +1 more source
Traffic gatekeeping, typically implemented using firewalls, is an essential functionality in today's networked computing systems such as desktop PCs. Traffic gatekeeping provides protection against a variety of over-the-network security attacks and can also be used to implement various communication resource management policies. With the development of
Mohammad Sajjad Hossain +1 more
openaire +1 more source
2014
Published as part of Santos, L. M. & Melo, G. A. R., 2014, Updating the taxonomy of the bee genus Megalopta (Hymenoptera: Apidae, Augochlorini) including revision of the Brazilian species, pp. 575-674 in Journal of Natural History 49 (11) on pages 597-600, DOI: 10.1080/00222933.2014.946106, http://zenodo.org/record ...
Santos, L. M., Melo, G. A. R.
openaire +1 more source
Published as part of Santos, L. M. & Melo, G. A. R., 2014, Updating the taxonomy of the bee genus Megalopta (Hymenoptera: Apidae, Augochlorini) including revision of the Brazilian species, pp. 575-674 in Journal of Natural History 49 (11) on pages 597-600, DOI: 10.1080/00222933.2014.946106, http://zenodo.org/record ...
Santos, L. M., Melo, G. A. R.
openaire +1 more source
i-AEGIS-128: An Improved Authenticated Encryption Based on AEGIS-128
2021 7th International Conference on Optimization and Applications (ICOA), 2021Authenticated Encryption (AE) is the latest cryptographic algorithm standard introduced through CAESAR (Com-petition for Authenticated Encryption: Security, Applicability, and Robustness). AE schemes provide a process for simultaneously achieving the security goals of confidentiality and integrity assurance.
Muhammad Ghulam Ghouse +4 more
openaire +1 more source
Proceedings of the 18th International Software Product Line Conference - Volume 1, 2014
This paper tells the story of the AEGIS Weapon System product line and how it evolved from a series of standalone software programs with no sharing into a true systems and software product line. The paper focuses on the strong internal and external governance of the product line.
Susan P. Gregg +3 more
openaire +1 more source
This paper tells the story of the AEGIS Weapon System product line and how it evolved from a series of standalone software programs with no sharing into a true systems and software product line. The paper focuses on the strong internal and external governance of the product line.
Susan P. Gregg +3 more
openaire +1 more source
Journal of Applied Rehabilitation Counseling, 1982
An argument is presented for viewing chronic illness and pain as a personalized attempt to master the stress of life. The concepts of individuation, negative identity, and illness behavior serve as the bases for viewing chronic illness and pain as protective armor, or ailment aegis. Historical and contemporary calls for viewing the patient as a person,
openaire +1 more source
An argument is presented for viewing chronic illness and pain as a personalized attempt to master the stress of life. The concepts of individuation, negative identity, and illness behavior serve as the bases for viewing chronic illness and pain as protective armor, or ailment aegis. Historical and contemporary calls for viewing the patient as a person,
openaire +1 more source
SSRN Electronic Journal, 2010
Intellectual property law stifles critical research on software security vulnerabilities, placing computer users at risk. Researchers who discover flaws often face IP-based legal threats if they reveal findings to anyone other than the software vendor.
Derek E. Bambauer, Oliver Day
openaire +1 more source
Intellectual property law stifles critical research on software security vulnerabilities, placing computer users at risk. Researchers who discover flaws often face IP-based legal threats if they reveal findings to anyone other than the software vendor.
Derek E. Bambauer, Oliver Day
openaire +1 more source
Bulletin de correspondance hellénique, 1900
Harrison Jane Ellen. Aegis-Άγρηνο'ν. In: Bulletin de correspondance hellénique. Volume 24, 1900. pp. 254-262.
openaire +2 more sources
Harrison Jane Ellen. Aegis-Άγρηνο'ν. In: Bulletin de correspondance hellénique. Volume 24, 1900. pp. 254-262.
openaire +2 more sources
AEGIS-Nexus: A Modular Cognitive Signal Engine for Ethical Multi-Agent Reasoning and Real-Time Value Arbitration Abstract:We present AEGIS-Nexus, a unified cognitive framework combining ethical signal processing, temporal awareness, and multi-agent arbitration to enable sovereign, adaptive artificial intelligence. This architecture integrates two core
openaire +1 more source
openaire +1 more source
Naval Engineers Journal, 2009
ForewordUnlike most editions of the Naval Engineers Journal, this special edition is intended for those both within and outside of the naval profession. To those not versed in the terminology, diving into any one of these articles without an orientation could be overwhelming.
openaire +1 more source
ForewordUnlike most editions of the Naval Engineers Journal, this special edition is intended for those both within and outside of the naval profession. To those not versed in the terminology, diving into any one of these articles without an orientation could be overwhelming.
openaire +1 more source
2017
The AEGIS (advancing knowledge-intensive entrepreneurship and innovation for growth and social well-being in Europe) database is described in this chapter, including the origin of the data product, the purpose of the data collection effort, and its completeness relative to other collections of information about small entrepreneurial firms.
Nancy J. Hodges, Albert N. Link
openaire +1 more source
The AEGIS (advancing knowledge-intensive entrepreneurship and innovation for growth and social well-being in Europe) database is described in this chapter, including the origin of the data product, the purpose of the data collection effort, and its completeness relative to other collections of information about small entrepreneurial firms.
Nancy J. Hodges, Albert N. Link
openaire +1 more source

