Results 201 to 210 of about 44,601 (278)

Eligible but Not Entitled: The Distinctiveness of Non‐Entitlement Policy Designs at the Frontline

open access: yesSocial Policy &Administration, EarlyView.
ABSTRACT This paper explores the distinctive dynamics of entitlement versus non‐entitlement social programmes, focusing on how this distinction influences frontline workers' management of access to social provisions. While much of the existing literature emphasises the macro‐level impacts of these alternative policy designs, this study focuses on their
Michal Koreh   +2 more
wiley   +1 more source

Education research: Getting started

open access: yesTeaching Statistics, EarlyView.
Abstract Statistics education research advances knowledge, informs teaching practices, and improves learning outcomes, but how does a higher education statistics educator get started in research? A panel discussion at the inaugural UK Conference on Teaching Statistics (UKCOTS) in 2024 addressed this challenge.
Jenny Terry   +5 more
wiley   +1 more source

Toward security-aware portable sequencing. [PDF]

open access: yesNat Commun
Stillman C   +3 more
europepmc   +1 more source

Fugitive Junctures: Life‐Seeking, Route‐Finding and the Mobile Ensemble at Kenya's Borders

open access: yesTransactions of the Institute of British Geographers, EarlyView.
Short Abstract Fugitivity has become an important conceptual frame to understand the illegalised mobilities of contemporary migrants in conjunction with enslaved people's historical lines of flight as spatial praxes to seize their own freedom. Thinking from Kenya, and drawing on research with migrants, border officials, activists, police and smugglers,
Hanno Brankamp
wiley   +1 more source

Painting authentication using CNNs and sliding window feature extraction. [PDF]

open access: yesFront Artif Intell
Ruiz de Miras J   +3 more
europepmc   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Enhanced EAADE: a quantum-resilient and privacy-preserving authentication protocol for secure data exchange in vehicular social networks. [PDF]

open access: yesSci Rep
Alrashdi R   +7 more
europepmc   +1 more source

Blockchain for the Arts and Humanities

open access: yesFuture Humanities, Volume 4, Issue 1, May 2026.
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley   +1 more source

Home - About - Disclaimer - Privacy