Results 31 to 40 of about 897,349 (250)
Lightweight Security for Network Coding
Under the emerging network coding paradigm, intermediate nodes in the network are allowed not only to store and forward packets but also to process and mix different data flows.
Barros, Joao +2 more
core +1 more source
Abstract As front‐line observers and active participants in pupils' daily lives, teachers closely monitor pupils' social interactions, emotional states and behavioural changes. Their unique perspective enables them to detect problems in the social lives of their pupils that may not be immediately visible to peers, parents or mental health professionals.
Yixuan Zheng +4 more
wiley +1 more source
Achieving Obfuscation Through Self-Modifying Code: A Theoretical Model [PDF]
With the extreme amount of data and software available on networks, the protection of online information is one of the most important tasks of this technological age.
Waddell, Heidi
core +1 more source
ABSTRACT This study examines the role of managerial ability in driving environmental performance and overall environmental, social, and governance (ESG) ratings in the context of the European Union sustainability reporting regulations. Using a sample of 7242 firm‐year observations over the period 2015–2023, our results indicate a structural change in ...
Mihaela Ionașcu +2 more
wiley +1 more source
ABSTRACT Despite growing interest in corporate relocation decisions and sustainability, the existing literature is limited in its consumer‐centric approach. Integrating social exchange theory and construal level theory, this research investigates how consumers perceive sustainability‐driven nearshoring motives (i.e., socio‐economic vs.
Cagla Dayangan +2 more
wiley +1 more source
ABSTRACT Objective Recent growth of online research has been accompanied by an increase in reports of fraudulent participants, which can significantly comprise research validity. Drawing from our experience using Qualtrics with open recruitment, existing literature, and emerging studies in eating disorders (ED), we outline the risk and provide simple ...
Jamie‐Lee Pennesi +2 more
wiley +1 more source
PI boundary control of linear hyperbolic balance laws with stabilization of ARZ traffic flow models
This paper investigates the proportional–integral (PI) boundary feedback control for the linear hyperbolic systems of balance laws which control and output measures are located at the boundaries. We address the issue of feedback stabilization by means of
Liguo Zhang, C. Prieur, J. Qiao
semanticscholar +1 more source
Conspiracy Theory Endorsement Profiles: A Cluster Validation Study
ABSTRACT A substantial body of research has investigated the determinants of conspiratorial beliefs, yet little is known about different conspiracy theory endorsement profiles. The present study used cluster analysis on a set of 52 conspiratorial statements tapping into six conspiracy theory types to identify and validate conspiracy theory endorsement ...
Otto Mäki +6 more
wiley +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
ABSTRACT This study explores incidental learning among physicians navigating uncertainty during the COVID‐19 pandemic. Using a constructivist research design, we conducted a literature review of 13 empirical studies on incidental learning in complexity and analyzed critical incident interviews with 12 emergency medicine and intensive care physicians ...
Henriette Lundgren +4 more
wiley +1 more source

