Results 61 to 70 of about 44,601 (278)

Information retrieval or document retrieval? Terminological confusions and unrealistic goals in information science, exemplified in relation to generative artificial intelligence

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract ChatGPT and related technologies have revived an old issue in information science (IS) concerning information retrieval (IR) versus document retrieval. Since 1950, the term IR has primarily been used as a misnomer for document retrieval. This problematic terminology reflects a desire to go beyond documents and provide, in response to user ...
Birger Hjørland
wiley   +1 more source

A Privacy Preserving Framework for RFID Based Healthcare Systems [PDF]

open access: yes, 2017
RFID (Radio Frequency IDentification) is anticipated to be a core technology that will be used in many practical applications of our life in near future. It has received considerable attention within the healthcare for almost a decade now. The technology’
Ahamed, Sheikh Iqbal   +2 more
core   +1 more source

Anonymous quantum communication

open access: yes, 2007
We present the first protocol for the anonymous transmission of a quantum state that is information-theoretically secure against an active adversary, without any assumption on the number of corrupt participants.
A. Broadbent   +10 more
core   +1 more source

Continual decision‐making dynamics across biological organisms

open access: yesBiological Reviews, EarlyView.
ABSTRACT Decision‐making is a central function of adaptive behaviour in biological agents. However, strategies for adaptive decision‐making can vary substantially across species. Here, we aim to extend the comparative scope of decision‐making analyses to phylogenetically diverse organisms.
Liberty Severs, Qiuran Wang
wiley   +1 more source

HotGrid: Graduated Access to Grid-based Science Gateways [PDF]

open access: yes, 2004
We describe the idea of a Science Gateway, an application-specific task wrapped as a web service, and some examples of these that are being implemented on the US TeraGrid cyberinfrastructure.
Bunn, Julian   +2 more
core  

Navigating Market Constraints: Sustainable Startups Driving Transformative Change Through Venture Creation

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This paper contributes to venture‐creation research by examining how sustainable startups can overcome market constraints to drive transformative change through their business development. Conceptually, we address this question by identifying venture‐creation narratives in the learning and experimental phases of sustainable startups that ...
Ville‐Veikko Piispanen   +2 more
wiley   +1 more source

Unclonable dynamic k-times anonymous authentication

open access: yesTongxin xuebao, 2012
In previous works of k-times anonymous authentication,two problems have not been properly solved:1)how to allow application providers to assign different maximal numbers of access for each user without weakened anonymity,and 2)how to protect against ...
Xin LIU, Qiu-liang XU
doaj   +2 more sources

Secure Directories [PDF]

open access: yes, 2000
This paper describes the mechanisms that are needed in order to provide a secure directory service based on the X.500 data model. A brief introduction to the X.500 data model is given followed by an overview of the Lightweight Directory Access Protocol ...
Chadwick, David W.
core  

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

Cultivating Circularity: Harnessing Industry 4.0 and Stakeholder Engagement for a Sustainable Agrifood Future in Brazil

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study analyzed Industry 4.0 (I4.0) technology applications in agribusiness and the role of strategic stakeholders, engagement methods, and other critical aspects data sharing, confidentiality, integrity, decision‐making, and sector‐specific requirements in promoting circularity.
Simone Sehnem   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy