Results 81 to 90 of about 776,400 (220)
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name [PDF]
An `obfuscation' for encrypted computing is quantified exactly here, leading to an argument that security against polynomial-time attacks has been achieved for user data via the deliberately `chaotic' compilation required for security properties in that ...
Breuer, Peter T.
core +1 more source
Abstract This essay, designed as a complement to opinions expressed by Rowan Williams and some speakers at the conference in his honour, explores features of early Christianity which suggest a positive evaluation of artificial intelligence. Noting that the fear of reducing humans to machines has been joined in the modern age by the fear that machines ...
Mark J. Edwards
wiley +1 more source
ABSTRACT How should we understand the duration of a pleasant or unpleasant sensation, insofar as its duration modulates how good or bad the experience is overall? Given that we seem able to distinguish between subjective and objective duration and that how well or badly someone's life goes is naturally thought of as something to be assessed from her ...
Andreas L. Mogensen
wiley +1 more source
Trusted execution environments for quantum computers
The cloud-based environments in which today's and future quantum computers will operate raise concerns about the security and privacy of user's intellectual property, whether code, or data, or both.
Theodoros Trochatos +6 more
doaj +1 more source
Open Innovation With Maker Communities: Exploring Collaboration Motives and Preferences of Makers
ABSTRACT Companies constantly seek new ways to innovate and integrate external knowledge into their innovation processes. In the era of makerspaces, a new source for collaborative innovation has evolved. As research shows, the users of makerspaces, so‐called makers, tend to be highly creative and innovative.
David Zakoth +2 more
wiley +1 more source
Abstract Manned space exploration to distant destinations, including Mars, continues to be an aspiration of humankind. Space travel does, however, present many challenges to the body, amongst which adaptation to microgravity is perhaps the largest. For instance, both short and long manned spaceflight missions have shown substantial deleterious effects ...
Gerard McMahon +2 more
wiley +1 more source
The current trend of globalization of the supply chain in the integrated circuit (IC) industry has led to numerous security issues, such as intellectual property (IP) piracy, overbuilding, hardware Trojan (HT), and so on.
Weizheng Wang, Luoyi Zhao, Shuo Cai
doaj +1 more source
Blockchain for the Arts and Humanities
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley +1 more source
Survey of Security Issues in Memristor-Based Machine Learning Accelerators for RF Analysis
We explore security aspects of a new computing paradigm that combines novel memristors and traditional Complimentary Metal Oxide Semiconductor (CMOS) to construct a highly efficient analog and/or digital fabric that is especially well-suited to Machine ...
Will Lillis +2 more
doaj +1 more source
Language machines: Toward a linguistic anthropology of large language models
Abstract Large language models (LLMs) challenge long‐standing assumptions in linguistics and linguistic anthropology by generating human‐like language without relying on rule‐based structures. This introduction to the special issue Language Machines calls for renewed engagement with LLMs as socially embedded language technologies.
Siri Lamoureaux +2 more
wiley +1 more source

