Results 121 to 130 of about 5,973,902 (354)

Part-Based Enhanced Super Resolution Network for Low-Resolution Person Re-Identification

open access: yesIEEE Access, 2020
Person re-identification (REID) is an important task in video surveillance and forensics applications. Many previous works often build models on the assumption that they have same resolution cross different camera views, while it is divorced from reality.
Yan Ha   +5 more
doaj   +1 more source

Security Protocols in a Nutshell [PDF]

open access: yesarXiv, 2016
Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols.
arxiv  

Security and computer forensics in web engineering education [PDF]

open access: yes, 2010
The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually.
Glisson, L.M., Glisson, W., Welland, R.
core  

Music Interventions in Hyperacute and Acute Stroke Patients: A Randomized Controlled Pilot Feasibility Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Music interventions have been shown to have beneficial effects on hemodynamic parameters, pain, and anxiety in various medical settings. However, music interventions in the setting of acute stroke have not been studied. The objective of this trial was to perform a pilot feasibility study of music interventions in the setting of acute
Jeffrey J. Fletcher   +7 more
wiley   +1 more source

Reconfigurable Security: Edge Computing-based Framework for IoT [PDF]

open access: yesarXiv, 2017
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications. In this article, we first provide requirements and existing solutions for IoT security.
arxiv  

Quantum-Classical Complexity-Security Tradeoff In Secure Multi-Party Computation [PDF]

open access: yes, 1999
I construct a secure multi-party scheme to compute a classical function by a succinct use of a specially designed fault-tolerant random polynomial quantum error correction code. This scheme is secure provided that (asymptotically) strictly greater than five-sixths of the players are honest.
arxiv   +1 more source

Computational Security of Quantum Encryption [PDF]

open access: yes, 2016
Quantum-mechanical devices have the potential to transform cryptography. Most research in this area has focused either on the information-theoretic advantages of quantum protocols or on the security of classical cryptographic schemes against quantum attacks.
Alagic, Gorjan   +5 more
openaire   +6 more sources

Home‐Based Tele‐tDCS in Amyotrophic Lateral Sclerosis: Feasibility, Safety, and Preliminary Efficacy

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Amyotrophic lateral sclerosis (ALS) is a progressive neurodegenerative disease with limited treatment options. Transcranial direct current stimulation (tDCS) shows promise as a neuromodulatory intervention in various neurological disorders, but its application in ALS, particularly in a remote, home‐based format, remains underexplored.
Sangeetha Madhavan   +6 more
wiley   +1 more source

Secure multiparty computations without computers

open access: yesTheoretical Computer Science, 1998
AbstractMany simple calculations can be done easier without computers than by using them. We show that the same holds for secure multiparty computations if the function to be computed is simple enough. Our starting point is an observation of Bert den Boer: a multiparty computation of a logical AND-gate can be performed by five simple playing cards.
Ari Renvall, Valtteri Niemi
openaire   +2 more sources

Patient Perceptions of Medication Therapy for Prevention of Posttraumatic Osteoarthritis Following Anterior Cruciate Ligament Injury: A Qualitative Content Analysis

open access: yesArthritis Care &Research, EarlyView.
Objective Posttraumatic osteoarthritis (PTOA) accounts for nearly 12% of osteoarthritis incidences and often occurs after anterior cruciate ligament (ACL) tear. Ensuring the uptake of preventive treatments for PTOA requires that investigators and clinicians understand factors influencing patients to seek preventive therapies.
Lily M. Waddell   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy