Results 71 to 80 of about 776,400 (220)
Haunted Care: Engaging Health Hauntology to Understand Health Citizenship in Evolving Welfare States
ABSTRACT This paper applies a hauntological framework to explore how health citizenship in the UK is shaped by the spectral presence of neoliberal policies, particularly through increased use of Public‐Private Partnerships (PPPs) in the United Kingdom's National Health Service (NHS).
Anna Horton
wiley +1 more source
The Network-on-Chip (NoC) plays an important role in high-speed and efficient communication in System-on-Chip architectures. However, the NoC topology can be extracted through reverse engineering attacks with the goal of making illegal copies or ...
Mona Hashemi +2 more
doaj +1 more source
Breeding 5.0: Artificial intelligence (AI)‐decoded germplasm for accelerated crop innovation
ABSTRACT Crop breeding technologies are vital for global food security. While traditional methods have improved yield, stress tolerance, and nutrition, rising challenges such as climate instability, land loss, and pest pressure now demand new solutions.
Jiayi Fu +4 more
wiley +1 more source
Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization
Intel Software Guard Extensions (SGX) is a promising hardware-based technology for protecting sensitive computations from potentially compromised system software.
Brasser F. +4 more
core +1 more source
From observation to understanding: A multi‐agent framework for smart microscopy
Abstract Smart microscopy represents a paradigm shift in biological imaging, moving from passive observation tools to active collaborators in scientific inquiry. Enabled by advances in automation, computational power, and artificial intelligence, these systems are now capable of adaptive decision‐making and real‐time experimental control.
P. S. Kesavan, Pontus Nordenfelt
wiley +1 more source
Abstract Objective Immersive virtual reality (VR) enhances ecological validity and facilitates intuitive and ergonomic hand interactions for performing neuropsychological assessments. However, its comparability to traditional computerized methods remains unclear. This study investigates the convergent validity, user experience and usability of VR‐based
Panagiotis Kourtesis +2 more
wiley +1 more source
Cloud instances are vulnerable to cross-core, cross-VM attacks against the shared, inclusive last-level cache. Automated cache template attacks, in particular, are very powerful as the vulnerabilities do not need to be manually identified.
Arun Raj, Janakiram Dharanipragada
doaj +1 more source
Counter‐Stigmatization in the Digital Age: The Case of the Sex Tech Award Incident
Abstract Scholars have shown considerable interest in how organizations manage stigma when powerful actors discredit them and their products. However, research has paid less attention to how organizations might deflect stigma back onto their stigmatizers.
Neva Bojovic +2 more
wiley +1 more source
Privacy Aware Offloading of Deep Neural Networks [PDF]
Deep neural networks require large amounts of resources which makes them hard to use on resource constrained devices such as Internet-of-things devices.
Dhoedt, Bart +3 more
core +2 more sources
Agnosticism about artificial consciousness
Could an AI have conscious experiences? Answers to this question should be based not on intuition, dogma or speculation but on solid scientific evidence. However, I argue such evidence is hard to come by and that the only justifiable stance is agnosticism.
Tom McClelland
wiley +1 more source

