Results 21 to 30 of about 897,349 (250)
Simplified Distributed Programming with Micro Objects
Developing large-scale distributed applications can be a daunting task. object-based environments have attempted to alleviate problems by providing distributed objects that look like local objects.
Gwen Salaün +3 more
core +3 more sources
Anomaly Detection based on Control-flow Pattern of Parallel Business Processes
The purpose of this paper was to discover an anomalous-free business process model from event logs. The process discovery was conducted using a graph database, specifically using Neo4J tool involving trace clustering and data filtering processes. We also
Hendra Darmawan +4 more
semanticscholar +1 more source
Uncertainty‐Guided Selective Adaptation Enables Cross‐Platform Predictive Fluorescence Microscopy
Deep learning models often fail when transferred to new microscopes. A novel framework overcomes this by selectively adapting the early layers governing low‐level image statistics, while freezing deep layers that encode morphology. This uncertainty‐guided approach enables robust, label‐free virtual staining across diverse systems, democratizing ...
Kai‐Wen K. Yang +9 more
wiley +1 more source
Large Language Model‐Based Chatbots in Higher Education
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci +4 more
wiley +1 more source
Identifying malicious nodes in network-coding-based peer-to-peer streaming networks [PDF]
published or submitted for ...
Khurana, Himanshu +3 more
core
ABSTRACT In Australia, governments fund Community Legal Centres (CLCs) as part of the legal assistance sector (LAS) to meet the ‘legal needs’ of people experiencing disadvantage who cannot afford private legal services. Persistent unmet demand for CLCs is well‐documented. As artificial intelligence (AI) is increasingly used in private legal practice to
Catherine Hastings +2 more
wiley +1 more source
Intrusion Detection Systems for Community Wireless Mesh Networks [PDF]
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive.
Hutchison, David +3 more
core +1 more source
From disorientation to preparedness: Information practices as scaffolding in acute crises
Abstract This qualitative study examines how adults in Israel enacted information practices during an acute national crisis. Using the information transitions framework, we investigate how concrete practices emerge and evolve across three stages: understanding, negotiating, and resolving. Semi‐structured Zoom interviews with 18 adults were analyzed via
Lilach Alon +2 more
wiley +1 more source
Using isotopes to constrain water flux and age estimates in snow-influenced catchments using the STARR (Spatially distributed Tracer-Aided Rainfall-Runoff) model [PDF]
Acknowledgements. This work was funded by the NERC/JPI SIWA project (NE/M019896/1) and the European Research Council ERC (project GA 335910 VeWa). Numerical simulations were performed using the Maxwell High Performance Computing Cluster of the University
Ala-aho, Pertti +4 more
core +4 more sources
Abstract Academic misconduct appeal services have quietly emerged within China's education marketplace, with commercial agencies promoting themselves on social media to assist international students facing misconduct hearings. While existing research on academic integrity has emphasized prevention and detection, far less attention has been paid to what
Gengyan Tang +2 more
wiley +1 more source

