Results 171 to 180 of about 44,601 (278)
Abstract Introduction Acute care paediatric teams face ambiguous, dynamic patient care situations that demand adaptability to avoid patient harm. Team huddles and adaptation processes have shown promise in mitigating risk and reducing harm. One team process that may occur in huddles is team reflection (TR), defined as a team's capacity to consciously ...
Rustin Meister +4 more
wiley +1 more source
A Post-Quantum Secure RFID Authentication Protocol Based on NTRU Encryption Algorithm. [PDF]
Liu H, Wu H, Ge N, Dong Q.
europepmc +1 more source
Three main approaches exist for finessing the cognitive demands of Grice's model of communication (a notorious problem): namely, deflationism, modularity, and interpretivism. Here, I consider each in light of human metacommunication, a phenomenon that has been neglected in foundational discussions of Gricean communication.
Ronald J. Planer
wiley +1 more source
Sybil-resistant and privacy-preserving authentication based on short-term pseudonym for internet of vehicles. [PDF]
Zhang C +4 more
europepmc +1 more source
“CONSCIENCE AND THE ENDS OF HUMANITY: CHRISTIAN HUMANISM AND ARTIFICIAL INTELLIGENCE”
Abstract The astonishing speed of the development of Artificial Intelligence (AI) has sparked reflections by theologians and philosophers on what distinctiveness, if any, human beings possess as individuals and as a species. This article addresses this question with respect to an ancient idea in Christian thought reaching back to St.
William Schweiker
wiley +1 more source
Anonymous and Efficient Chaotic Map-Based Authentication Protocol for Industrial Internet of Things. [PDF]
Zeng D +6 more
europepmc +1 more source
National Colonialism: Nation‐State, Colonialism and Colonisation of Kurdistan
ABSTRACT This article develops the concept of ‘national colonialism’ to capture colonial relations in the nation‐state form. It does so through a critical appraisal of the concept of ‘internal colonialism’, which largely fails to explain the links between nationalism and colonial relations.
Behnam Amini
wiley +1 more source
A multi-authority attribute ring signature supporting dynamic policies and dual anonymity for zero-trust networks. [PDF]
Chen J, Zhou X, Fu W, Mao Y, Wang J.
europepmc +1 more source
Abstract The present paper presents a new (formal) theory of presence according to which, roughly, to be present at a place is to have a delegate located at that place. One crucial feature of the theory is that something can be present at a place without thereby being located there.
Claudio Calosi
wiley +1 more source
A secure group-based authentication protocol for IoVT in 5G-enabled smart transportation and road safety systems. [PDF]
Singh G +3 more
europepmc +1 more source

