Results 51 to 60 of about 464,365 (270)

The Future of Research in Cognitive Robotics: Foundation Models or Developmental Cognitive Models?

open access: yesAdvanced Robotics Research, EarlyView.
Research in cognitive robotics founded on principles of developmental psychology and enactive cognitive science would yield what we seek in autonomous robots: the ability to perceive its environment, learn from experience, anticipate the outcome of events, act to pursue goals, and adapt to changing circumstances without resorting to training with ...
David Vernon
wiley   +1 more source

Selecting a Secure Cloud Provider—An Empirical Study and Multi Criteria Approach

open access: yesInformation, 2020
Security has become one of the primary factors that cloud customers consider when they select a cloud provider for migrating their data and applications into the Cloud.
Sebastian Pape   +3 more
doaj   +1 more source

UTact: Underwater Vision‐Based Tactile Sensor with Geometry Reconstruction and Contact Force Estimation

open access: yesAdvanced Robotics Research, EarlyView.
Embedded flexible sensing technologies advance underwater soft robotics, yet most systems still suffer from hysteresis and limited perceptiveness. Instead, vision‐based tactile sensors provide reliable and rapid feedback essential for complex underwater tasks.
Qiyi Zhang   +5 more
wiley   +1 more source

Managing the outsourcing of information security processes: the 'cloud' solution [PDF]

open access: yes, 2013
Information security processes and systems are relevant for any organization and involve medium-to-high investment; however, the current economic downturn is causing a dramatic reduction in spending on Information Technology (IT).
Marabelli, Marco, Newell, Sue
core   +1 more source

Gait Analysis of Pak Biawak: A Necrobot Lizard Built using the Skeleton of an Asian Water Monitor (Varanus Salvator)

open access: yesAdvanced Robotics Research, EarlyView.
Pak Biawak, a necrobot, embodies an unusual fusion of biology and robotics. Designed to repurpose natural structures after death, it challenges conventional boundaries between nature and engineering. Its movements are precise yet unsettling, raising questions about sustainability, ethics, and the untapped potential of biointegrated machines.
Leo Foulds   +2 more
wiley   +1 more source

基于层次分析—模糊评价的云计算安全评估与对策

open access: yesTongxin xuebao, 2016
With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing ...
Ai-min YANG   +3 more
doaj   +2 more sources

The Refugee Problem: An International Legal Tangle [PDF]

open access: yes, 1958
Change is constant and computing paradigm is no exception. It has witnessed major shifts right from centralized client server systems to widely distributed systems. This time the locus of change in the computing paradigm is moving towards virtualization,
Bradway, John S., Evans, Alona E.
core   +1 more source

Inhaled Angiopoietin‐Like 4 Antisense Oligonucleotide Therapy for Lung Injury and Fibrosis

open access: yesAdvanced Science, EarlyView.
Inhaled antisense oligonucleotides targeting ANGPTL4 attenuate inflammation, preserve barrier integrity, and reduce fibrosis in both infectious and sterile lung injury models. Integrated transcriptomic analysis reveals a conserved ANGPTL4‐regulated gene network coordinating hypoxic, inflammatory, apoptotic, and stress‐response pathways.
Haiyang Fan   +21 more
wiley   +1 more source

eTPM: A Trusted Cloud Platform Enclave TPM Scheme Based on Intel SGX Technology

open access: yesSensors, 2018
Today cloud computing is widely used in various industries. While benefiting from the services provided by the cloud, users are also faced with some security issues, such as information leakage and data tampering.
Haonan Sun   +5 more
doaj   +1 more source

Developing Secure Cloud Applications

open access: yesScalable Computing: Practice and Experience, 2014
Today the main limit to Cloud adoption is related to the perception of a security loss the users have. Indeed, the existing solutions to provide security are mainly focused on Cloud service provider prospective in order to securely integrate frameworks and Infrastructures as a Services in a Cloud datacenter.
Massimiliano Rak   +4 more
openaire   +5 more sources

Home - About - Disclaimer - Privacy