Results 121 to 130 of about 5,973,902 (354)
Part-Based Enhanced Super Resolution Network for Low-Resolution Person Re-Identification
Person re-identification (REID) is an important task in video surveillance and forensics applications. Many previous works often build models on the assumption that they have same resolution cross different camera views, while it is divorced from reality.
Yan Ha+5 more
doaj +1 more source
Security Protocols in a Nutshell [PDF]
Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols.
arxiv
Security and computer forensics in web engineering education [PDF]
The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually.
Glisson, L.M., Glisson, W., Welland, R.
core
ABSTRACT Objective Music interventions have been shown to have beneficial effects on hemodynamic parameters, pain, and anxiety in various medical settings. However, music interventions in the setting of acute stroke have not been studied. The objective of this trial was to perform a pilot feasibility study of music interventions in the setting of acute
Jeffrey J. Fletcher+7 more
wiley +1 more source
Reconfigurable Security: Edge Computing-based Framework for IoT [PDF]
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications. In this article, we first provide requirements and existing solutions for IoT security.
arxiv
Quantum-Classical Complexity-Security Tradeoff In Secure Multi-Party Computation [PDF]
I construct a secure multi-party scheme to compute a classical function by a succinct use of a specially designed fault-tolerant random polynomial quantum error correction code. This scheme is secure provided that (asymptotically) strictly greater than five-sixths of the players are honest.
arxiv +1 more source
Computational Security of Quantum Encryption [PDF]
Quantum-mechanical devices have the potential to transform cryptography. Most research in this area has focused either on the information-theoretic advantages of quantum protocols or on the security of classical cryptographic schemes against quantum attacks.
Alagic, Gorjan+5 more
openaire +6 more sources
Home‐Based Tele‐tDCS in Amyotrophic Lateral Sclerosis: Feasibility, Safety, and Preliminary Efficacy
ABSTRACT Objective Amyotrophic lateral sclerosis (ALS) is a progressive neurodegenerative disease with limited treatment options. Transcranial direct current stimulation (tDCS) shows promise as a neuromodulatory intervention in various neurological disorders, but its application in ALS, particularly in a remote, home‐based format, remains underexplored.
Sangeetha Madhavan+6 more
wiley +1 more source
Secure multiparty computations without computers
AbstractMany simple calculations can be done easier without computers than by using them. We show that the same holds for secure multiparty computations if the function to be computed is simple enough. Our starting point is an observation of Bert den Boer: a multiparty computation of a logical AND-gate can be performed by five simple playing cards.
Ari Renvall, Valtteri Niemi
openaire +2 more sources
Objective Posttraumatic osteoarthritis (PTOA) accounts for nearly 12% of osteoarthritis incidences and often occurs after anterior cruciate ligament (ACL) tear. Ensuring the uptake of preventive treatments for PTOA requires that investigators and clinicians understand factors influencing patients to seek preventive therapies.
Lily M. Waddell+10 more
wiley +1 more source