Results 171 to 180 of about 123,825 (281)
BloomSec: Scalable and privacy-preserving searchable encryption for cloud environments. [PDF]
Khan AN +5 more
europepmc +1 more source
Abstract This study investigates the role of locality (a task/material‐related variable), demographic factors (age, education, and sex), cognitive capacities (verbal working memory [WM], verbal short‐term memory [STM], speed of processing [SOP], and inhibition), and morphosyntactic category (time reference and grammatical aspect) in verb‐related ...
Marielena Soilemezidi +3 more
wiley +1 more source
A Lightweight Privacy-Enhanced Federated Clustering Algorithm for Edge Computing. [PDF]
Wang J +5 more
europepmc +1 more source
High-Throughput and Memory-Efficient Pipeline Key-Value Store Architecture on FPGA. [PDF]
Wang X, Liu L, Li Y.
europepmc +1 more source
Hear Me Out: A Lesson in Civil Discourse
Abstract This article describes an innovative and engaging lecture and class exercise designed to teach students how to think critically about issues from different perspectives and communicate effectively with those who disagree with them. The interactive lecture and class exercise introduce a civil discourse framework to encourage constructive ...
Cheryl L. Black
wiley +1 more source
Blockchain-driven smart contract with key exchange protocol for secure device-to-device communication using verkle tree K-ary structures. [PDF]
Simbu A, Nandakumar S, Saravanan K.
europepmc +1 more source
When Does Hope Drive Social Change? Empirical Insights and Their Policy Implications
ABSTRACT When and how does people's hope for change drive social transformation? This question has gained urgency amidst the profound sociopolitical crises of the 21st century, including escalating intergroup conflicts, accelerating environmental degradation, and mounting threats to democracy.
Oded Adomi Leshem, Eran Halperin
wiley +1 more source
A hybrid blockchain migration framework for converting traditional databases into blockchain-based EMR systems. [PDF]
Al-Busaidi A, Mani J, Yoosuf MS, P V.
europepmc +1 more source
Tiivistelmä Viime vuosina digitaaliseen tiedonsiirtoon perustuva tiedonsiirto on yleistynyt valtavasti. Tästä on seurannut monia uusia tietoturvaongelmia. Tässä yhteydessä erityisesti tiedon suojaamiseen käytetyt kryptografiset menetelmät ovat olleet tarkastelun kohteena.
openaire +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source

