Results 101 to 110 of about 374,311 (355)

Legal and ethical considerations around the use of existing illustrations to generate new illustrations in the anatomical sciences

open access: yesAnatomical Sciences Education, Volume 18, Issue 3, Page 289-300, March 2025.
Abstract It is likely existing anatomical illustrations are often used as the basis for new illustrative works, given not all illustrators have access to human tissues, bodies, or prosections on which to base their illustrations. Potential issues arise with this practice in the realms of copyright infringement and plagiarism when authors are seeking to
Jon Cornwall   +7 more
wiley   +1 more source

A PRIMER ON BLOCKCHAIN

open access: yesInternational Journal of Advances in Scientific Research and Engineering, 2018
Originally developed as the accounting method for the virtual currency Bitcoin, Blockchains are appearing in a variety of commercial applications today. Blockchain technology is a type of distributed digital ledger that uses encryption to make entries permanent and tamper-proof and can be programmed to record financial transactions.
Suxia Cui   +3 more
openaire   +2 more sources

Blockchain for social good: a quantitative analysis

open access: yes, 2018
The rise of blockchain technologies has given a boost to social good projects, which are trying to exploit various characteristic features of blockchains: the quick and inexpensive transfer of cryptocurrency, the transparency of transactions, the ability
Bartoletti, Massimo   +3 more
core   +1 more source

Usage of the term provenance in LIS literature: An Annual Review of Information Science and Technology (ARIST) paper

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract Provenance is the story of how something has come to be. In this paper, we provide a systematic literature review to categorize the various notions of provenance in Information Sciences. The goal of this review is to paint a broader picture of the multiple uses of provenance at play and to enhance our understanding of the importance of ...
Rhiannon Bettivia   +2 more
wiley   +1 more source

Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities

open access: yesCybersecurity, 2023
Vulnerability reports are essential for improving software security since they record key information on vulnerabilities. In a report, CWE denotes the weakness of the vulnerability and thus helps quickly understand the cause of the vulnerability ...
Peng Liu   +6 more
doaj   +1 more source

The Blockchain Folk Theorem [PDF]

open access: yesThe Review of Financial Studies, 2018
Blockchains are distributed ledgers, operated within peer-to-peer networks. If reliable and stable, they could offer a new, cost effective way to record transactions, but are they? We model the proof-of-work blockchain protocol as a stochastic game and analyse the equilibrium strategies of rational, strategic miners.
Biais, Bruno   +3 more
openaire   +6 more sources

A Survey of Distributed Consensus Protocols for Blockchain Networks [PDF]

open access: yesIEEE Communications Surveys and Tutorials, 2019
Since the inception of Bitcoin, cryptocurrencies and the underlying blockchain technology have attracted an increasing interest from both academia and industry.
Yang Xiao   +3 more
semanticscholar   +1 more source

Philosophy of Blockchain Technology - Ontologies [PDF]

open access: yes, 2019
About the necessity and usefulness of developing a philosophy specific to the blockchain technology, emphasizing on the ontological aspects. After an Introduction that highlights the main philosophical directions for this emerging technology, in ...
Sfetcu, Nicolae
core   +1 more source

The issues caused by misinformation—How workers and organizations deal with it: A systematic literature review

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract In today's digital age, misinformation propagates rapidly through digital channels, blurring the lines between truth and fiction, and challenging the foundations of trust in information sources. Although affecting all spheres of life, misinformation poses a significant threat to workers highlighting a critical intersection between ...
Ashwani Malhotra   +4 more
wiley   +1 more source

A Logic of Blockchain Updates [PDF]

open access: yesJournal of Logic and Computation, 2017
Abstract Blockchains are distributed data structures that are used to achieve consensus in systems for cryptocurrencies (like Bitcoin) or smart contracts (like Ethereum). Although blockchains gained a lot of popularity recently, there are only few logic-based models for blockchains available.
Dandolo Flumini   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy