Results 171 to 180 of about 123,825 (281)

BloomSec: Scalable and privacy-preserving searchable encryption for cloud environments. [PDF]

open access: yesPLoS One
Khan AN   +5 more
europepmc   +1 more source

Independent Effects of Age, Education, Verbal Working Memory, Motor Speed of Processing, Locality, and Morphosyntactic Category on Verb‐Related Morphosyntactic Production: Evidence From Healthy Aging

open access: yesTopics in Cognitive Science, EarlyView.
Abstract This study investigates the role of locality (a task/material‐related variable), demographic factors (age, education, and sex), cognitive capacities (verbal working memory [WM], verbal short‐term memory [STM], speed of processing [SOP], and inhibition), and morphosyntactic category (time reference and grammatical aspect) in verb‐related ...
Marielena Soilemezidi   +3 more
wiley   +1 more source

Hear Me Out: A Lesson in Civil Discourse

open access: yesJournal of Legal Studies Education, Volume 43, Issue 1, Page 7-30, Winter 2026.
Abstract This article describes an innovative and engaging lecture and class exercise designed to teach students how to think critically about issues from different perspectives and communicate effectively with those who disagree with them. The interactive lecture and class exercise introduce a civil discourse framework to encourage constructive ...
Cheryl L. Black
wiley   +1 more source

When Does Hope Drive Social Change? Empirical Insights and Their Policy Implications

open access: yesSocial Issues and Policy Review, Volume 20, Issue 1, December 2026.
ABSTRACT When and how does people's hope for change drive social transformation? This question has gained urgency amidst the profound sociopolitical crises of the 21st century, including escalating intergroup conflicts, accelerating environmental degradation, and mounting threats to democracy.
Oded Adomi Leshem, Eran Halperin
wiley   +1 more source

Hash function security:cryptanalysis of the Very Smooth Hash and multicollisions in generalised iterated hash functions

open access: yes, 2012
Tiivistelmä Viime vuosina digitaaliseen tiedonsiirtoon perustuva tiedonsiirto on yleistynyt valtavasti. Tästä on seurannut monia uusia tietoturvaongelmia. Tässä yhteydessä erityisesti tiedon suojaamiseen käytetyt kryptografiset menetelmät ovat olleet tarkastelun kohteena.
openaire   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy