Results 51 to 60 of about 221,142 (145)

Experimentally Validated Design Principles of D‐Block Transition Metal Single‐Atom Non‐Dissociative Chemisorption Solid‐State Hydrogen Storage Materials

open access: yesAdvanced Functional Materials, EarlyView.
A novel descriptor and a bottom‐up design principle are established to enable the rational design of hydrogen storage materials based on d‐block transition metal single‐atom COFs. By modulating H₂ adsorption through d‐orbital tuning, this approach achieves both high storage capacity and fast kinetics, while revealing a volcano‐type relationship between
Qiuyan Yue   +24 more
wiley   +1 more source

Defense against Insider Threat: a Framework for Gathering Goal-based Requirements [PDF]

open access: yes, 2006
Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges.
Franqueira, Virginia Nunes Leal   +1 more
core   +3 more sources

Asymptotic Methods for Asset Market Equilibrium Analysis [PDF]

open access: yes
General equilibrium analysis is difficult when asset markets are incomplete. We make the simplifying assumption that uncertainty is small and use bifurcation methods to compute Taylor series approximations for asset demand and asset market equilibrium. A
Kenneth L. Judd, Sy-Ming Guu
core  

Auditoría de gestión de seguridad informática, en entidades públicas y privadas en Loja

open access: yesMaskana, 2017
RESUMEN Este documento exhibe información sobre normas, estándares y metodologías, utilizados para la gestión de seguridad de un Data Center y Red LAN.
Carlos Jaramillo   +5 more
doaj  

Towards Security Requirements in Online Summative Assessments

open access: yes, 2009
Confidentiality, integrity and availability (C-I-A) are the security requirements fundamental to any computer system. Similarly, the hardware, software and data are important critical assets.
Apampa, K.M, Argles, D, Wills, G.B
core  

Toward optimal multi-objective models of network security: Survey [PDF]

open access: yes, 2011
Information security is an important aspect of a successful business today. However, financial difficulties and budget cuts create a problem of selecting appropriate security measures and keeping networked systems up and running. Economic models proposed
Huang, W, Maple, C, Viduto, Valentina
core  

Desarrollo de software esteganográfico con criptográfia asociada

open access: yesMaskana, 2017
RESUMEN Proteger la información es un requisito fundamental para preservar su confidencialidad e integridad. El uso de criptografía y esteganografía, más que un simple compendio de técnicas y algoritmos, se ha convertido en una necesidad urgente en ...
Jorge Rivadeneira, Basel Halak
doaj  

The Game of Credit: A High Stakes Game That Perpetuates the Racial Wealth Gap [PDF]

open access: yes, 2014
Everyone deserves the opportunity to build a financially secure future for themselves and their families. Access to equal opportunities is the cornerstone of America's core values and is also a necessity to growing a healthy economy.
Lindy Carrow
core  

Firearm-related action recognition and object detection dataset for video surveillance systems

open access: yesData in Brief
The proposed dataset is comprised of 398 videos, each featuring an individual engaged in specific video surveillance actions. The ground truth for this dataset was expertly curated and is presented in JSON format (standard COCO), offering vital ...
Jesus Ruiz-Santaquiteria   +4 more
doaj  

U.S. public and private venture capital markets, 1998-2001: A fundamental information analysis [PDF]

open access: yes
Systematic analysis of U.S. capital markets reveals important empirical facts that analytical modeling or empirical research seeking to explain the 1998-2001 movements needs to recognize. There is no single "bubble point" at which U.S.
Armstrong, Chris   +3 more
core  

Home - About - Disclaimer - Privacy