Results 111 to 120 of about 233,719 (314)

Beyond 5G and Non‐terrestrial Network (NTN) Integrated Architecture: Access Challenges for Expanding Artificial Intelligence of Things (AIoT)

open access: yesInternational Journal of Satellite Communications and Networking, EarlyView.
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley   +1 more source

Half-Lives of Hackers and the Shelf Life of Hacks [PDF]

open access: yes, 2017
What is the speed of hacking? Luca Follis and Adam Fish explore the temporality of hacking and leaking in the cases of Snowden, the DNC leaks and the Lauri Love ...
Fish, Adam Richard, Follis, Luca
core   +1 more source

Advancing Green Human Resource Management Aspects and Practices in Organizations: The Power of Fuzzy Importance Performance Analysis

open access: yesSustainable Development, EarlyView.
ABSTRACT Drawing on intersections between the Ability–Motivation–Opportunity (AMO) framework and the Resource‐Based View of the Firm (RBV‐F), this research critiques key convergent and divergent theoretical aspects of Green HRM. This approach led to the formulation and implementation of a Fuzzy Importance–Performance Analysis (FIPA) method to evaluate ...
Shah Ridwan Chowdhury   +3 more
wiley   +1 more source

The Computer Misuse Act 1990: lessons from its past and predictions for its future [PDF]

open access: yes, 2008
The age of the internet has thrown down some real challenges to the Computer Misuse Act 1990. Recently, the Government made changes to this piece of legislation, in an attempt to meet two of those challenges--the proliferation of “ Denial of Service ...
Macewan, NF
core  

Hacking the genome [PDF]

open access: yesNature Methods, 2006
Like computer hackers who cooperate in developing and using tools to understand and manipulate the inner workings of computer software, researchers are developing sophisticated biological methods that will allow them to crack the function of the genome.
openaire   +2 more sources

Designer DNA‐Based Machines

open access: yesSmartBot, EarlyView.
DNA machinery represents a burgeoning frontier at the intersection of robotics and nanotechnology, evolving from static nanostructure toward dynamic nanorobots. Here, the authors review the comprehensive research pipeline of designer DNA‐based nanomachines, covering the design, analysis, and fabrication. These programmable systems enable transformative
Yiquan An   +5 more
wiley   +1 more source

Hacking commercial quantum cryptography systems by tailored bright illumination

open access: yes, 2010
The peculiar properties of quantum mechanics allow two remote parties to communicate a private, secret key, which is protected from eavesdropping by the laws of physics. So-called quantum key distribution (QKD) implementations always rely on detectors to
A Lamas-Linares   +27 more
core   +1 more source

The 2025 “Hacking Limnology” Workshop Series and DSOS Virtual Summit: A Half Decade of Data‐Intensive Aquatic Science

open access: yes
Limnology and Oceanography Bulletin, EarlyView.
Michael F. Meyer   +20 more
wiley   +1 more source

The use of LLMs to annotate data in management research: Foundational guidelines and warnings

open access: yesStrategic Management Journal, EarlyView.
Abstract Research Summary The emergence of large language models (LLMs) offers new opportunities for AI integration in research, particularly for data annotation and text classification. However, researchers lack guidance on implementation best practices, as the benefits and risks of these tools remain poorly understood.
Natalie A. Carlson, Vanessa Burbano
wiley   +1 more source

The Hackathon Phenomenon [PDF]

open access: yes, 2015
date-added: 2015-03-24 04:16:59 +0000 date-modified: 2015-03-24 04:16:59 +0000date-added: 2015-03-24 04:16:59 +0000 date-modified: 2015-03-24 04:16:59 ...
Briscoe, G, Mulligan, C
core  

Home - About - Disclaimer - Privacy