Results 61 to 70 of about 44,601 (278)
Abstract ChatGPT and related technologies have revived an old issue in information science (IS) concerning information retrieval (IR) versus document retrieval. Since 1950, the term IR has primarily been used as a misnomer for document retrieval. This problematic terminology reflects a desire to go beyond documents and provide, in response to user ...
Birger Hjørland
wiley +1 more source
A Privacy Preserving Framework for RFID Based Healthcare Systems [PDF]
RFID (Radio Frequency IDentification) is anticipated to be a core technology that will be used in many practical applications of our life in near future. It has received considerable attention within the healthcare for almost a decade now. The technology’
Ahamed, Sheikh Iqbal +2 more
core +1 more source
Anonymous quantum communication
We present the first protocol for the anonymous transmission of a quantum state that is information-theoretically secure against an active adversary, without any assumption on the number of corrupt participants.
A. Broadbent +10 more
core +1 more source
Continual decision‐making dynamics across biological organisms
ABSTRACT Decision‐making is a central function of adaptive behaviour in biological agents. However, strategies for adaptive decision‐making can vary substantially across species. Here, we aim to extend the comparative scope of decision‐making analyses to phylogenetically diverse organisms.
Liberty Severs, Qiuran Wang
wiley +1 more source
HotGrid: Graduated Access to Grid-based Science Gateways [PDF]
We describe the idea of a Science Gateway, an application-specific task wrapped as a web service, and some examples of these that are being implemented on the US TeraGrid cyberinfrastructure.
Bunn, Julian +2 more
core
ABSTRACT This paper contributes to venture‐creation research by examining how sustainable startups can overcome market constraints to drive transformative change through their business development. Conceptually, we address this question by identifying venture‐creation narratives in the learning and experimental phases of sustainable startups that ...
Ville‐Veikko Piispanen +2 more
wiley +1 more source
Unclonable dynamic k-times anonymous authentication
In previous works of k-times anonymous authentication,two problems have not been properly solved:1)how to allow application providers to assign different maximal numbers of access for each user without weakened anonymity,and 2)how to protect against ...
Xin LIU, Qiu-liang XU
doaj +2 more sources
This paper describes the mechanisms that are needed in order to provide a secure directory service based on the X.500 data model. A brief introduction to the X.500 data model is given followed by an overview of the Lightweight Directory Access Protocol ...
Chadwick, David W.
core
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta +73 more
core +1 more source
ABSTRACT This study analyzed Industry 4.0 (I4.0) technology applications in agribusiness and the role of strategic stakeholders, engagement methods, and other critical aspects data sharing, confidentiality, integrity, decision‐making, and sector‐specific requirements in promoting circularity.
Simone Sehnem +3 more
wiley +1 more source

