Results 11 to 20 of about 13,337 (106)
Strategic Planning in the Middle Byzantine Period: A "Limitrophe" Policy Reintroduced?
In order to maintain or improve its political stability and overall might every state conducts certain policies, both domestic and foreign, throughout its history.
Dragan Gjalevski
doaj +1 more source
Towards Trustworthy Collaborative Editing
Real-time collaborative editing applications are drastically different from typical client–server applications in that every participant has a copy of the shared document.
Mamdouh Babi, Wenbing Zhao
doaj +1 more source
Stall‐Free Asynchronous State Repartitioning With a Proactive Workload Tracking Window
ABSTRACT High‐throughput stateful applications rely on dynamic data repartitioning to adapt to changing workloads, but this process presents significant challenges. This paper provides a detailed analysis of such challenges, drilling down into the tradeoffs between adaptation, computational overhead, and service availability. We identify that a primary
Douglas Pereira Luiz +1 more
wiley +1 more source
Abstract This chapter examines the contours of the religious and spiritual information experiences subfield through a review and content analysis of selected contributions from the past two decades in both information science and related fields. The research question that guides this review is: How have spirituality and religion been conceptualized in ...
Nadia Caidi +4 more
wiley +1 more source
Blockchain in Communication Networks: A Comprehensive Review
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley +1 more source
The study presents C3Crowd$C^3Crowd$, a blockchain‐based framework designed to enhance security in crowd management through decentralization, cryptography and smart contracts. It uses reputation management and a credit‐based incentive model to encourage user participation while safeguarding sensitive crowd data.
Sukanta Chakraborty, Abhishek Majumder
wiley +1 more source
Communication‐Security Co‐Design for Federated Learning in Grant‐Free NOMA IoT Networks
This article presents SA‐PPO, a Security‐Aware Proximal Policy Optimisation framework for federated learning over grant‐free NOMA (non‐orthogonal multiple access) in IoT networks. By jointly optimising access control, resource allocation, and trust‐weighted aggregation using cross‐layer indicators, SA‐PPO enhances both communication reliability and ...
Emmanuel Atebawone +5 more
wiley +1 more source
The charging station (CS) plays a crucial role in charging electric vehicles. Therefore, it is necessary to protect the CS from cyberattacks. This paper proposes an architecture for the security of the EV fleet during charging using the XGBoost model and Hyperledger Fabric to protect battery management systems (BMS) from cyberattacks.
Gaurav Kumar, Suresh Mikkili
wiley +1 more source
Design and Development of a Blockchain‐Enabled Decentralized Framework for Academic Microcredentials
Traditional higher education faces significant challenges, including rising costs, inflexibility, and a disconnect from workforce demands, while current credentialing systems are often centralized and vulnerable to fraud. Microcredentials have emerged as a solution, yet they lack integration into formal degree pathways and face issues with recognition ...
Abrar Mahbub Tanim +4 more
wiley +1 more source
Rethinking Blockchain and Power Dynamics in Supply Chains: A Critical Discourse Analysis
ABSTRACT Despite a generally positive discourse on blockchain technology in academic literature, firms have struggled to implement it in their supply chains. In this article, we are deconstructing the typically positive perception of blockchain in the literature through a provocative style of theorizing and critical discourse analysis.
Lara Schilling +2 more
wiley +1 more source

