Results 51 to 60 of about 468,074 (268)
Research on Security Enhancement Algorithm in Cloud System [PDF]
The current security protection of cloud system is mainly carried out in a single aspect.It is difficult to achieve comprehensive security protection and it lacks the ability to evaluate the security of cloud system.Therefore,a security enhancement ...
ZHANG Wei, WANG Yihuai
doaj +1 more source
Assessing database and network threats in traditional and cloud computing [PDF]
Cloud Computing is currently one of the most widely-spoken terms in IT. While it offers a range of technological and financial benefits, its wide acceptance by organizations is not yet wide spread.
Lourida, Katerina +2 more
core
Whispering‐gallery‐mode microresonators with sharp resonant peaks enable photonic barcoding. Similar to a chameleon, a rare‐earth‐free microcavity with π‐conjugated PAHs enables visibleto‐near infrared color generation from a single microbead. The unique resonat emission (spectral barcode) can be dynamically transformed via excitation wavelength change,
Barun Kumar Barman +6 more
wiley +1 more source
The Future of Research in Cognitive Robotics: Foundation Models or Developmental Cognitive Models?
Research in cognitive robotics founded on principles of developmental psychology and enactive cognitive science would yield what we seek in autonomous robots: the ability to perceive its environment, learn from experience, anticipate the outcome of events, act to pursue goals, and adapt to changing circumstances without resorting to training with ...
David Vernon
wiley +1 more source
With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing ...
Ai-min YANG +3 more
doaj +2 more sources
Embedded flexible sensing technologies advance underwater soft robotics, yet most systems still suffer from hysteresis and limited perceptiveness. Instead, vision‐based tactile sensors provide reliable and rapid feedback essential for complex underwater tasks.
Qiyi Zhang +5 more
wiley +1 more source
eTPM: A Trusted Cloud Platform Enclave TPM Scheme Based on Intel SGX Technology
Today cloud computing is widely used in various industries. While benefiting from the services provided by the cloud, users are also faced with some security issues, such as information leakage and data tampering.
Haonan Sun +5 more
doaj +1 more source
Developing Secure Cloud Applications
Today the main limit to Cloud adoption is related to the perception of a security loss the users have. Indeed, the existing solutions to provide security are mainly focused on Cloud service provider prospective in order to securely integrate frameworks and Infrastructures as a Services in a Cloud datacenter.
Massimiliano Rak +4 more
openaire +5 more sources
Pak Biawak, a necrobot, embodies an unusual fusion of biology and robotics. Designed to repurpose natural structures after death, it challenges conventional boundaries between nature and engineering. Its movements are precise yet unsettling, raising questions about sustainability, ethics, and the untapped potential of biointegrated machines.
Leo Foulds +2 more
wiley +1 more source
A proposed case for the cloud software engineering in security [PDF]
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core

