Results 11 to 20 of about 13,337 (106)

Strategic Planning in the Middle Byzantine Period: A "Limitrophe" Policy Reintroduced?

open access: yesStudia Ceranea, 2023
In order to maintain or improve its political stability and overall might every state conducts certain policies, both domestic and foreign, throughout its history.
Dragan Gjalevski
doaj   +1 more source

Towards Trustworthy Collaborative Editing

open access: yesComputers, 2017
Real-time collaborative editing applications are drastically different from typical client–server applications in that every participant has a copy of the shared document.
Mamdouh Babi, Wenbing Zhao
doaj   +1 more source

Stall‐Free Asynchronous State Repartitioning With a Proactive Workload Tracking Window

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 3, February 2026.
ABSTRACT High‐throughput stateful applications rely on dynamic data repartitioning to adapt to changing workloads, but this process presents significant challenges. This paper provides a detailed analysis of such challenges, drilling down into the tradeoffs between adaptation, computational overhead, and service availability. We identify that a primary
Douglas Pereira Luiz   +1 more
wiley   +1 more source

Spiritual and religious information experiences: An Annual Review of Information Science and Technology (ARIST) paper

open access: yesJournal of the Association for Information Science and Technology, Volume 77, Issue 1, Page 40-61, January 2026.
Abstract This chapter examines the contours of the religious and spiritual information experiences subfield through a review and content analysis of selected contributions from the past two decades in both information science and related fields. The research question that guides this review is: How have spirituality and religion been conceptualized in ...
Nadia Caidi   +4 more
wiley   +1 more source

Blockchain in Communication Networks: A Comprehensive Review

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley   +1 more source

C3Crowd$C^3Crowd$: Crowd Contributor and Consumer Framework for Secure Crowd Management Using Blockchain

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
The study presents C3Crowd$C^3Crowd$, a blockchain‐based framework designed to enhance security in crowd management through decentralization, cryptography and smart contracts. It uses reputation management and a credit‐based incentive model to encourage user participation while safeguarding sensitive crowd data.
Sukanta Chakraborty, Abhishek Majumder
wiley   +1 more source

Communication‐Security Co‐Design for Federated Learning in Grant‐Free NOMA IoT Networks

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This article presents SA‐PPO, a Security‐Aware Proximal Policy Optimisation framework for federated learning over grant‐free NOMA (non‐orthogonal multiple access) in IoT networks. By jointly optimising access control, resource allocation, and trust‐weighted aggregation using cross‐layer indicators, SA‐PPO enhances both communication reliability and ...
Emmanuel Atebawone   +5 more
wiley   +1 more source

Design and Implementation of XGBoost‐Based Cyberattack Detection and Blockchain‐Enabled Charging Station

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
The charging station (CS) plays a crucial role in charging electric vehicles. Therefore, it is necessary to protect the CS from cyberattacks. This paper proposes an architecture for the security of the EV fleet during charging using the XGBoost model and Hyperledger Fabric to protect battery management systems (BMS) from cyberattacks.
Gaurav Kumar, Suresh Mikkili
wiley   +1 more source

Design and Development of a Blockchain‐Enabled Decentralized Framework for Academic Microcredentials

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Traditional higher education faces significant challenges, including rising costs, inflexibility, and a disconnect from workforce demands, while current credentialing systems are often centralized and vulnerable to fraud. Microcredentials have emerged as a solution, yet they lack integration into formal degree pathways and face issues with recognition ...
Abrar Mahbub Tanim   +4 more
wiley   +1 more source

Rethinking Blockchain and Power Dynamics in Supply Chains: A Critical Discourse Analysis

open access: yesJournal of Business Logistics, Volume 47, Issue 1, January 2026.
ABSTRACT Despite a generally positive discourse on blockchain technology in academic literature, firms have struggled to implement it in their supply chains. In this article, we are deconstructing the typically positive perception of blockchain in the literature through a provocative style of theorizing and critical discourse analysis.
Lara Schilling   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy