Results 121 to 130 of about 95,792 (317)

A Scalable Architecture for Secured Access to Distributed Services

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2017
Web services which are an implementation of Services Oriented Architecture (SOA), are emergent technologies and promising the development, the deployment and the integration of Internet applications. They are initially based on three main layers that are
Telesphore Tiendrebeogo
doaj   +1 more source

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

A Bridge Transformer Network With Deep Graph Convolution for Hyperspectral Image Classification

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Transformers have been widely applied to hyperspectral image classification, leveraging their self‐attention mechanism for powerful global modelling. However, two key challenges remain as follows: excessive memory and computational costs from calculating correlations between all tokens (especially as image size or spectral bands increase) and ...
Yuquan Gan   +5 more
wiley   +1 more source

Security-Enhanced Decentralized Content Sharing in Publish/Subscribe System

open access: yesIEEE Access
We consider a content dissemination model, where the contents disseminated from a content source on a regular or event-driven basis are shared among the group members, without directly contacting the content source.
Wang-Seok Park   +2 more
doaj   +1 more source

Load Balancing Hashing for Geographic Hash Tables [PDF]

open access: yes
In this paper, we address the problem of balancing the network traffic load generated when querying a geographic hash table. State-of-the-art approaches can be used to improve load balancing by changing the underlying geo-routing protocol used to forward
Renda, Maria Elena   +2 more
core  

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Single Cell Analysis Reveals Dynamic Changes of Distinct Cell Populations in Human Nickel Allergy

open access: yesAllergy, EarlyView.
We investigated cell types mediating the early and late inflammatory responses in human Ni2+‐allergy by scRNA‐Seq. Early responsiveness was mainly mediated by TLR4+TAGLN− endothelial cells indirectly activating TLR4−KRT16+ keratinocytes, and CCR7+DCN+ DCs. Late responsiveness was crucially driven by infiltration of KLF2+ central memory T cells and TLR4+
Marc Schmidt   +7 more
wiley   +1 more source

Identification of MEF2A, MEF2C, and MEF2D interactomes in basal and Fsk‐stimulated mouse MA‐10 Leydig cells

open access: yesAndrology, EarlyView.
Abstract Background Myocyte enhancer factor 2 transcription factors regulate essential transcriptional programs in various cell types. The activity of myocyte enhancer factor 2 factors is modulated through interactions with cofactors, chromatin remodelers, and other regulatory proteins, which are dependent on cell context and physiological state.
Karine de Mattos   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy