Results 31 to 40 of about 241,807 (271)

Attribute-based proxy signature scheme for unmanned aerial vehicle networks

open access: yesTongxin xuebao, 2021
It is necessary to use digital signature scheme to protect integrity and authentication of commands sent by command agencies to unmanned aerial vehicle (UAV) in the UAV networks.Moreover, the signature scheme should ensure UAV can receive signature in ...
Lei HE, Jianfeng MA, Dawei WEI
doaj   +2 more sources

Aperiodic conductivity oscillations in quasi-ballistic graphene heterojunctions

open access: yes, 2010
We observe conductivity oscillations with aperiodic spacing to only one side of the tunneling current in a dual-gated graphene field effect transistor with an n-p-n type potential barrier.
Ai, Nan   +4 more
core   +1 more source

Anonymous attribute-based designated verifier signature

open access: yesJournal of Ambient Intelligence and Humanized Computing, 2022
An Attribute-based signature (ABS), is a cryptographic scheme where someone can sign a message using any kind of predicates verified by the attributes he owns. For such scheme, it is expected to be impossible for users to collude to sign a message if none of them is originally able to sign the message on his own.
Blazy, Olivier   +3 more
openaire   +3 more sources

Reusable attribute-based signature with attribute revocation and authenticated key agreement

open access: yes网络与信息安全学报
In the pursuit of establishing a unified model for fine-grained access control and secure data communication within a distributed microservices architecture, a verifier-policy attributed-based signature (VP-ABS) scheme, augmented with attribute ...
Zhishuo ZHANG, Huixi YANG, Wen HUANG, Yongjian LIAO, Shijie ZHOU
doaj   +3 more sources

A frame signature matrix for analysing and comparing interaction design behaviour [PDF]

open access: yes, 2012
Protocol studies are an established method to investigate design behaviour. In the context of a project to investigate novice interaction design (ID) behaviour across protocols and cultures, we found that existing design behaviour analysis frameworks did
Blyth, Richard   +5 more
core   +1 more source

Feasibility and Preliminary Efficacy of Integrative Neuromuscular Training for Childhood Cancer Survivors: A Pilot Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Survivors of childhood acute lymphoblastic leukemia (ALL) often exhibit early deficits in muscle and movement competence, which can compromise long‐term health. Integrative neuromuscular training (INT), a multifaceted approach combining fundamental movement activities with strength exercises, may help address these deficits during ...
Anna Maria Markarian   +7 more
wiley   +1 more source

All Buttons In: An investigation into the use of the 1176 FET compressor in popular music production [PDF]

open access: yes, 2012
The Urei/Universal Audio 1176 is one of the most revered and popular compressors used in music production (Senior 2009). Bill Putnam introduced the design in 1966 and at the time it was the first peak limiter based on all transistor circuit (Universal ...
Moore, Austin
core  

A Database Interface for Complex Objects [PDF]

open access: yes, 1993
We describe a formal design for a logical query language using psi-terms as data structures to interact effectively and efficiently with a relational database.
Ait-Kaci, Hassan   +3 more
core   +9 more sources

The Role of Invasive Procedures in the Treatment of Complicated Gastrointestinal Graft‐Versus‐Host Disease in Pediatric Patients

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Gastrointestinal graft‐versus‐host disease (GI GVHD) following hematopoietic stem cell transplant is typically managed with medical therapy, but surgery and angioembolization may be warranted in selected cases with life‐threatening complications.
Gaia Brunetti   +12 more
wiley   +1 more source

Zero Shot Recognition with Unreliable Attributes [PDF]

open access: yes, 2016
In principle, zero-shot learning makes it possible to train a recognition model simply by specifying the category's attributes. For example, with classifiers for generic attributes like \emph{striped} and \emph{four-legged}, one can construct a ...
Grauman, Kristen, Jayaraman, Dinesh
core  

Home - About - Disclaimer - Privacy