Results 21 to 30 of about 155,128 (235)

Node discovery in a networked organization

open access: yes, 2009
In this paper, I present a method to solve a node discovery problem in a networked organization. Covert nodes refer to the nodes which are not observable directly.
Maeno, Yoshiharu
core   +1 more source

Pediatric Oncology Nursing Competencies in Latin America and the Caribbean: A Scoping Review to Inform Practice, Education, and Research

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Nurses are central to cancer care for children and adolescents, yet no comprehensive synthesis has defined essential core competencies for pediatric oncology nursing (PON) practice internationally, particularly in Latin America and the Caribbean (LAC).
Luís Carlos Lopes‐Júnior   +7 more
wiley   +1 more source

Covert Quantum Internet

open access: yes, 2017
We apply covert quantum communication based on entanglement generated from the Minkowski vacuum to the setting of quantum computation and quantum networks.
Brown, André EX   +11 more
core   +5 more sources

Behavioral Mimicry Covert Communication [PDF]

open access: yes, 2012
In this paper, the use of structural behavior of communication protocols (e.g., CSMA) in designing new covert channels is investigated. In this way, the covert transmitter adopts the communication protocol architecture to control its overt traffic flow yet with different parameters that give it enough freedom to embed the covert message in its overt ...
Seyed Ali Ahmadzadeh, Gordon B. Agnew
openaire   +1 more source

Financial Burden Associated With Hospitalisation Among Families of Childhood Brain Tumours in Australia

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Families of children with cancer experience significant financial strain, even with universal healthcare. Indirect costs, such as productivity losses and non‐medical expenses, are rarely included in economic evaluations, and little is known about how effectively financial aid programmes alleviate this burden. Childhood brain tumours
Megumi Lim   +8 more
wiley   +1 more source

Blinatumomab Utilization in Pediatric B‐Cell Acute Lymphoblastic Leukemia: Experience From the Mountain West

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Blinatumomab is a bispecific T‐cell engager approved for the treatment of pediatric B‐cell acute lymphoblastic leukemia (B‐ALL). Outpatient home infusion reduces hospitalization burden and optimizes resource utilization, but is logistically challenging.
Angela Parra del Riego   +10 more
wiley   +1 more source

Optimal Throughput for Covert Communication Over a Classical-Quantum Channel

open access: yes, 2016
This paper considers the problem of communication over a memoryless classical-quantum wiretap channel subject to the constraint that the eavesdropper on the channel should not be able to learn whether the legitimate parties are using the channel to ...
Wang, Ligong
core   +4 more sources

Covert Communication in the Presence of an Uninformed Jammer [PDF]

open access: yesIEEE Transactions on Wireless Communications, 2017
14 pages, 4 ...
Tamara V. Sobers   +4 more
openaire   +2 more sources

Hospitalization Through Families’ Eyes: Comparing Inpatient Care Quality for Children With Sickle Cell Disease and Cystic Fibrosis in Canada

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Sickle cell disease (SCD) is a chronic, inherited hemoglobinopathy that requires frequent hospitalization for disease‐related complications. Canadian data on inpatient care is limited. This study compared caregiver‐reported hospital experiences of children with SCD to those with cystic fibrosis (CF), a chronic, autosomal recessive ...
Hailey M. Zwicker   +11 more
wiley   +1 more source

Study on Airspace Covert Communication Algorithm of Covert Communication System

open access: yesJournal of Networks, 2012
Based on the security of information transmission through network in the information society, the paper puts forward covert communication technology which is more reliable than the prior encryption algorithm, analyzes channel covertness and information hiding of covert communication technology based on spread-spectrum communication technology, and ...
openaire   +1 more source

Home - About - Disclaimer - Privacy