Results 101 to 110 of about 690,729 (282)
Abstract Premise Insect herbivory is a major biotic factor shaping plant populations and driving the evolution of defensive traits. Polyploidy (whole‐genome duplication) often induces substantial phenotypic and genotypic changes that may affect species interactions, including herbivory.
Antonio J. Manzaneda +4 more
wiley +1 more source
Computation in anonymous networks
We identify and investigate a computational model arising in molecular computing, social computing and sensor network. The model is made of of multiple agents who are computationally limited and posses no global information. The agents may represent nodes in a social network, sensors, or molecules in a molecular computer. Assuming that each agent is in
Mossel, Elchanan +2 more
openaire +2 more sources
How to Meet in Anonymous Network
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kowalski, Dariusz R., Malinowski, Adam
openaire +2 more sources
Coalition Formation with Local Public Goods and Network Effect [PDF]
Many local public goods are provided by coalitions and some of them have network effects. Namely, people prefer to consume a public good in a coalition with more members.
Fan-chin Kung
core
Abstract Although peer support is central to the social model approach emphasized in sober living houses (SLHs), no longitudinal studies have examined helping among SLH residents. This longitudinal study examined benefits of helping in three contexts among SLH residents. Data were from 205 participants entering 28 SLHs across 2021–2023. Interviews were
Sarah E. Zemore +4 more
wiley +1 more source
Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks
Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network.
Javier Portela +4 more
doaj +1 more source
Distributed Computing on Anonymous Hypercube Networks
Summary: We consider the bit-complexity (i.e.a, total number of bits transmitted) of computing Boolean functions on an anonymous canonically labeled \(n\)-dimensional hypercube network and give a characterization of the Boolean functions computable on such a network as exactly those Boolean functions which are invariant under all bit-complement ...
E. Kranakis, D. Krizanc
openaire +2 more sources
Abstract This manuscript centers on the experiences of caretakers of minors in Honduran transnational families (TNFs) in which one or both parents emigrated, and of the schoolteachers, professional psychologists, and spiritual leaders working with these families.
Marco Gemignani +2 more
wiley +1 more source
Security flaws and improvement to a wireless authentication protocol with anonymity
The anonymous security flaw of an authentication protocol with anonymity for wireless networks which was proposed by Zhu, et al. was analyzed, and an improved protocol to a wireless authentication protocol with anonymity (IWAA) was proposed.
PENG Hua-xi, FENG Deng-guo
doaj +2 more sources
ABSTRACT This study explored the mediating influences of access to social activities, social services, and health and medical services on the relationship between social determinants of health and health‐related quality of life. A survey of 602 adults was conducted in a regional area of Australia.
Candice Oster +4 more
wiley +1 more source

