Results 41 to 50 of about 392,009 (311)

Dynamic Input/Output Automata: a Formal and Compositional Model for Dynamic Systems [PDF]

open access: yes, 2016
We present dynamic I/O automata (DIOA), a compositional model of dynamic systems. In DIOA, automata can be created and destroyed dynamically, as computation proceeds, and an automaton can dynamically change its signature, i.e., the set of actions in ...
Attie, Paul C., Lynch, Nancy A.
core   +2 more sources

Exercise Interventions in Children, Adolescents and Young Adults With Paediatric Bone Tumours—A Systematic Review

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Bone tumours present significant challenges for affected patients, as multimodal therapy often leads to prolonged physical limitations. This is particularly critical during childhood and adolescence, as it can negatively impact physiological development and psychosocial resilience.
Jennifer Queisser   +5 more
wiley   +1 more source

The influence of leader–signaled knowledge hiding on tourism employees’ work withdrawal behavior: A moderated mediating model

open access: yesFrontiers in Psychology, 2022
Even though organizations encourage the dissemination of knowledge and information among organizational members, the phenomenon of knowledge hiding still exists widely in organizations.
Anxin Xu   +3 more
doaj   +1 more source

Unified Description for Network Information Hiding Methods

open access: yes, 2016
Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel characteristics, such as robustness and bandwidth, while others describe
Mazurczyk, Wojciech   +2 more
core   +2 more sources

High capacity steganographic method based upon JPEG [PDF]

open access: yes, 2008
The two most important aspects of any image-based steganographic system are the quality of the stegoimage and the capacity of the cover image. This paper proposes a novel and high capacity steganographic approach based on Discrete Cosine Transformation (
Al-Mohammad, A, Ghinea, G, Hierons, RM
core   +1 more source

Information-theoretic analysis of information hiding [PDF]

open access: yesIEEE Transactions on Information Theory, 2002
Summary: An information-theoretic analysis of information hiding is presented, forming the theoretical basis for design of information-hiding systems. Information hiding is an emerging research area which encompasses applications such as copyright protection for digital media, watermarking, fingerprinting, steganography, and data embedding.
Moulin, Pierre, O'Sullivan, Joseph A.
openaire   +2 more sources

Mechanisms of parasite‐mediated disruption of brain vessels

open access: yesFEBS Letters, EarlyView.
Parasites can affect the blood vessels of the brain, often causing serious neurological problems. This review explains how different parasites interact with and disrupt these vessels, what this means for brain health, and why these processes matter. Understanding these mechanisms may help us develop better ways to prevent or treat brain infections in ...
Leonor Loira   +3 more
wiley   +1 more source

Anonymity and Information Hiding in Multiagent Systems [PDF]

open access: yes, 2003
We provide a framework for reasoning about information-hiding requirements in multiagent systems and for reasoning about anonymity in particular. Our framework employs the modal logic of knowledge within the context of the runs and systems framework ...
Halpern, Joseph Y., O'Neill, Kevin R.
core   +6 more sources

Overview of molecular signatures of senescence and associated resources: pros and cons

open access: yesFEBS Open Bio, EarlyView.
Cells can enter a stress response state termed cellular senescence that is involved in various diseases and aging. Detecting these cells is challenging due to the lack of universal biomarkers. This review presents the current state of senescence identification, from biomarkers to molecular signatures, compares tools and approaches, and highlights ...
Orestis A. Ntintas   +6 more
wiley   +1 more source

A Novel Information Hiding Approach using Selective Quantization Technique in Video Coding

open access: yesJOIV: International Journal on Informatics Visualization
This research examines the different areas of information hiding in current and emerging video compression standards. In the subsequent sections, we provide a detailed comparison of these techniques based on partition modes, prediction units, transform ...
Joan Hau, Yiqi Tew, Li Peng Tan
doaj   +1 more source

Home - About - Disclaimer - Privacy