Results 61 to 70 of about 20,903 (180)

Advances in Triboelectric Nanogenerators With Rotating Structure

open access: yesCarbon Energy, Volume 8, Issue 2, February 2026.
The rotating TENG has been widely studied for its superiorities of simple structure, high efficiency, and stable output. This review introduced the four different principles of rotating TENG and offered a thorough summary for performance and application research through three‐level classification. Importantly, the current existing problems, challenges,
Chuguo Zhang   +4 more
wiley   +1 more source

Where Dinner Roams: The Role of Feral Horses as a Resource Subsidy for Wolves and Cougars in West‐Central British Columbia

open access: yesEcology and Evolution, Volume 16, Issue 2, February 2026.
In west‐central British Columbia, large populations of feral horses overlap with native species like caribou and predators such as wolves and cougars, potentially disrupting predator–prey dynamics. Between 2019 and 2025, researchers documented multiple instances of wolf and cougar predation on feral horses—the first such confirmed cases in the region ...
Shane C. White   +3 more
wiley   +1 more source

Sub‐annual spatiotemporal dynamics of sediment and organic matter storage in beaver ponds

open access: yesEarth Surface Processes and Landforms, Volume 51, Issue 2, February 2026.
Ponds higher up the beaver cascades showed increasing erosion of sediments following heavier rainfall events, whereas those further down showed increasing sediment accretion. Following periods with less intense rainfall all ponds showed net sediment accretion.
Gareth Bradbury   +4 more
wiley   +1 more source

INTELLIGENT COOPERATIVE WEB CACHING POLICIES FOR MEDIA OBJECTS BASED ON J48 DECISION TREE AND NAÏVE BAYES SUPERVISED MACHINE LEARNING ALGORITHMS IN STRUCTURED PEER-TO-PEER SYSTEMS

open access: yesJournal of ICT, 2016
Web caching plays a key role in delivering web items to end users in World Wide Web (WWW). On the other hand, cache size is considered as a limitation of web caching.
Hamidah Ibrahim   +3 more
doaj  

Clustering Analysis of Very Large Measurement and Model Data Sets on High‐Performance Computing Platforms

open access: yesJournal of Geophysical Research: Atmospheres, Volume 131, Issue 1, 16 January 2026.
Abstract Hierarchical agglomerative clustering is a useful analysis technique which allows for a level of stability, interpretability and flexibility not available in other similar techniques such as K‐means, density‐based clustering or positive matrix factorization.
Colin J. Lee   +2 more
wiley   +1 more source

Future Climate Change Threatens the Genetic Diversity and Distribution of Some South American Freshwater Crustaceans of the Genus Aegla

open access: yesAquatic Conservation: Marine and Freshwater Ecosystems, Volume 36, Issue 1, January 2026.
ABSTRACT Climate change significantly threatens biodiversity, particularly in freshwater ecosystems, which host many endemic and threatened species. Among them, aeglids stand out as strictly endemic, ecologically important and highly threatened crustaceans, making them a relevant model for investigating the impacts of climate change on aquatic ...
Gislaine Puli   +4 more
wiley   +1 more source

Minimizing Single-Usage Cache Pollution for Effective Cache Hierarchy Management

open access: yes, 2006
Efficient cache hierarchy management is of a paramount importance when designing high performance processors. Upon a miss, the conventional operation mode of a cache hierarchy is to retrieve back the missing block from higher levels and to store the block into all hierarchy levels.
Piquet, Thomas   +2 more
openaire   +1 more source

Software Grand Exposure: SGX Cache Attacks Are Practical

open access: yes, 2017
Side-channel information leakage is a known limitation of SGX. Researchers have demonstrated that secret-dependent information can be extracted from enclave execution through page-fault access patterns.
Brasser, Ferdinand   +5 more
core  

ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches [PDF]

open access: yes, 2012
HTTP Parameter Pollution (HPP) vulnerabilities allow attackers to exploit web applications by manipulating the query parameters of the requested URLs. In this paper, we present Application Request Cache (ARC), a framework for protecting web applications against HPP exploitation.
Elias Athanasopoulos   +3 more
openaire   +1 more source

Dynamic Information Flow Tracking on Multicores [PDF]

open access: yes, 2008
Dynamic Information Flow Tracking (DIFT) is a promising technique for detecting software attacks. Due to the computationally intensive nature of the technique, prior efficient implementations [21, 6] rely on specialized hardware support whose only ...
Gupta, Rajiv   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy