Results 51 to 60 of about 468,074 (268)

Research on Security Enhancement Algorithm in Cloud System [PDF]

open access: yesJisuanji gongcheng, 2019
The current security protection of cloud system is mainly carried out in a single aspect.It is difficult to achieve comprehensive security protection and it lacks the ability to evaluate the security of cloud system.Therefore,a security enhancement ...
ZHANG Wei, WANG Yihuai
doaj   +1 more source

Assessing database and network threats in traditional and cloud computing [PDF]

open access: yes, 2013
Cloud Computing is currently one of the most widely-spoken terms in IT. While it offers a range of technological and financial benefits, its wide acceptance by organizations is not yet wide spread.
Lourida, Katerina   +2 more
core  

Chameleonic Color‐Variable Microbead Emitters for Multilevel Spectroscopic Encryption from Visible to Infrared Wavelengths

open access: yesAdvanced Optical Materials, EarlyView.
Whispering‐gallery‐mode microresonators with sharp resonant peaks enable photonic barcoding. Similar to a chameleon, a rare‐earth‐free microcavity with π‐conjugated PAHs enables visibleto‐near infrared color generation from a single microbead. The unique resonat emission (spectral barcode) can be dynamically transformed via excitation wavelength change,
Barun Kumar Barman   +6 more
wiley   +1 more source

The Future of Research in Cognitive Robotics: Foundation Models or Developmental Cognitive Models?

open access: yesAdvanced Robotics Research, EarlyView.
Research in cognitive robotics founded on principles of developmental psychology and enactive cognitive science would yield what we seek in autonomous robots: the ability to perceive its environment, learn from experience, anticipate the outcome of events, act to pursue goals, and adapt to changing circumstances without resorting to training with ...
David Vernon
wiley   +1 more source

基于层次分析—模糊评价的云计算安全评估与对策

open access: yesTongxin xuebao, 2016
With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing ...
Ai-min YANG   +3 more
doaj   +2 more sources

UTact: Underwater Vision‐Based Tactile Sensor with Geometry Reconstruction and Contact Force Estimation

open access: yesAdvanced Robotics Research, EarlyView.
Embedded flexible sensing technologies advance underwater soft robotics, yet most systems still suffer from hysteresis and limited perceptiveness. Instead, vision‐based tactile sensors provide reliable and rapid feedback essential for complex underwater tasks.
Qiyi Zhang   +5 more
wiley   +1 more source

eTPM: A Trusted Cloud Platform Enclave TPM Scheme Based on Intel SGX Technology

open access: yesSensors, 2018
Today cloud computing is widely used in various industries. While benefiting from the services provided by the cloud, users are also faced with some security issues, such as information leakage and data tampering.
Haonan Sun   +5 more
doaj   +1 more source

Developing Secure Cloud Applications

open access: yesScalable Computing: Practice and Experience, 2014
Today the main limit to Cloud adoption is related to the perception of a security loss the users have. Indeed, the existing solutions to provide security are mainly focused on Cloud service provider prospective in order to securely integrate frameworks and Infrastructures as a Services in a Cloud datacenter.
Massimiliano Rak   +4 more
openaire   +5 more sources

Gait Analysis of Pak Biawak: A Necrobot Lizard Built using the Skeleton of an Asian Water Monitor (Varanus Salvator)

open access: yesAdvanced Robotics Research, EarlyView.
Pak Biawak, a necrobot, embodies an unusual fusion of biology and robotics. Designed to repurpose natural structures after death, it challenges conventional boundaries between nature and engineering. Its movements are precise yet unsettling, raising questions about sustainability, ethics, and the untapped potential of biointegrated machines.
Leo Foulds   +2 more
wiley   +1 more source

A proposed case for the cloud software engineering in security [PDF]

open access: yes, 2014
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core  

Home - About - Disclaimer - Privacy