Results 31 to 40 of about 897,349 (250)

Lightweight Security for Network Coding

open access: yes, 2008
Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different data flows.
Barros, Joao   +2 more
core   +1 more source

‘School is their whole world’: Teachers' perspectives on loneliness among children and adolescents from England and mainland China

open access: yesBritish Educational Research Journal, EarlyView.
Abstract As front‐line observers and active participants in pupils' daily lives, teachers closely monitor pupils' social interactions, emotional states and behavioural changes. Their unique perspective enables them to detect problems in the social lives of their pupils that may not be immediately visible to peers, parents or mental health professionals.
Yixuan Zheng   +4 more
wiley   +1 more source

Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]

open access: yes, 2020
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core   +1 more source

Does Managerial Ability Improve Environmental Performance and Overall ESG Ratings? The Impact of the European Sustainability Reporting Mandate

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study examines the role of managerial ability in driving environmental performance and overall environmental, social, and governance (ESG) ratings in the context of the European Union sustainability reporting regulations. Using a sample of 7242 firm‐year observations over the period 2015–2023, our results indicate a structural change in ...
Mihaela Ionașcu   +2 more
wiley   +1 more source

Reciprocity on the Edge of Distance Paradox: How Sustainability Motives and Hypocrisy Shape Consumer Responses to Nearshoring

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Despite growing interest in corporate relocation decisions and sustainability, the existing literature is limited in its consumer‐centric approach. Integrating social exchange theory and construal level theory, this research investigates how consumers perceive sustainability‐driven nearshoring motives (i.e., socio‐economic vs.
Cagla Dayangan   +2 more
wiley   +1 more source

Safeguarding Online Research in Eating Disorders Against Fraud: Increasing Risks and Practical Recommendations

open access: yesInternational Journal of Eating Disorders, EarlyView.
ABSTRACT Objective Recent growth of online research has been accompanied by an increase in reports of fraudulent participants, which can significantly comprise research validity. Drawing from our experience using Qualtrics with open recruitment, existing literature, and emerging studies in eating disorders (ED), we outline the risk and provide simple ...
Jamie‐Lee Pennesi   +2 more
wiley   +1 more source

PI boundary control of linear hyperbolic balance laws with stabilization of ARZ traffic flow models

open access: yesSystems & control letters (Print), 2019
This paper investigates the proportional–integral (PI) boundary feedback control for the linear hyperbolic systems of balance laws which control and output measures are located at the boundaries. We address the issue of feedback stabilization by means of
Liguo Zhang, C. Prieur, J. Qiao
semanticscholar   +1 more source

Conspiracy Theory Endorsement Profiles: A Cluster Validation Study

open access: yesEuropean Journal of Social Psychology, EarlyView.
ABSTRACT A substantial body of research has investigated the determinants of conspiratorial beliefs, yet little is known about different conspiracy theory endorsement profiles. The present study used cluster analysis on a set of 52 conspiratorial statements tapping into six conspiracy theory types to identify and validate conspiracy theory endorsement ...
Otto Mäki   +6 more
wiley   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

“Thinking Out Loud” and “Pivoting on the Fly”—An Empirical Review and Critical Incident Study of How Physicians Engage in Incidental Learning Amidst Complexity

open access: yesHuman Resource Development Quarterly, EarlyView.
ABSTRACT This study explores incidental learning among physicians navigating uncertainty during the COVID‐19 pandemic. Using a constructivist research design, we conducted a literature review of 13 empirical studies on incidental learning in complexity and analyzed critical incident interviews with 12 emergency medicine and intensive care physicians ...
Henriette Lundgren   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy