Results 31 to 40 of about 4,587,248 (341)
CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha +16 more
core +3 more sources
Computation modelling is playing an increasingly accepted and important role in neuroscience. It is not a unitary enterprise, though, and the distinction between two different sorts of modelling, one interested in description and the other also in function, is illustrated by their application to activity-dependent developmental plasticity and adult ...
openaire +3 more sources
Quantum Key Distribution with Displaced Thermal States
Secret key exchange relies on the creation of correlated signals, serving as the raw resource for secure communication. Thermal states exhibit Hanbury Brown and Twiss correlations, which offer a promising avenue for generating such signals. In this paper,
Adam Walton +2 more
doaj +1 more source
In this era of digitization, most hardcopy documents are being transformed into digital formats. In the process of transformation, large quantities of documents are stored and preserved through electronic scanning.
Alaa Sulaiman +2 more
doaj +1 more source
In this digital age, ports face stiff competition in global supply chain. Smart ports, as high performing ports, utilize information and communications technology (ICT) to provide a wide range of smart applications, resulting in vastly improved vessels ...
Kok-Lim Alvin Yau +4 more
doaj +1 more source
CyVerse Austria—A Local, Collaborative Cyberinfrastructure
Life sciences (LS) are advanced in research data management, since LS have established disciplinary tools for data archiving as well as metadata standards for data reuse.
Konrad Lang +6 more
doaj +1 more source
The authors desire to characterize the natural numbers by their structure, as opposed to designating a particular choice of objects like \(\emptyset\), \(\{\emptyset\}\), etc. But at the same time, they wish to rule out nonstandard models -- and not to make their description circular.
Halbach, V, Horsten, LFM
openaire +4 more sources
The areas of entertainment computing and persuasive technologies are interdisciplinary fields that have gained increasing attention in the last decades.
Paula Alexandra Silva +6 more
doaj +1 more source
ABSTRACT We sought to identify potential early risk biomarkers for lung disease in children post‐allogeneic HCT. Patients with pulmonary function tests 3 months post‐transplant and plasma samples between days 7 and 14 post‐HCT were included. Six of 27 subjects enrolled had reduced forced expiratory volume 1 (FEV1) z scores.
Isabella S. Small +3 more
wiley +1 more source
Resource Allocation in Networking and Computing Systems: A Security and Dependability Perspective
In recent years, there has been a trend to integrate networking and computing systems, whose management is getting increasingly complex. Resource allocation is one of the crucial aspects of managing such systems and is affected by this increased ...
Md Muhidul I. Khan, Gianfranco Nencioni
doaj +1 more source

