Results 41 to 50 of about 392,009 (311)
Dynamic Input/Output Automata: a Formal and Compositional Model for Dynamic Systems [PDF]
We present dynamic I/O automata (DIOA), a compositional model of dynamic systems. In DIOA, automata can be created and destroyed dynamically, as computation proceeds, and an automaton can dynamically change its signature, i.e., the set of actions in ...
Attie, Paul C., Lynch, Nancy A.
core +2 more sources
ABSTRACT Bone tumours present significant challenges for affected patients, as multimodal therapy often leads to prolonged physical limitations. This is particularly critical during childhood and adolescence, as it can negatively impact physiological development and psychosocial resilience.
Jennifer Queisser +5 more
wiley +1 more source
Even though organizations encourage the dissemination of knowledge and information among organizational members, the phenomenon of knowledge hiding still exists widely in organizations.
Anxin Xu +3 more
doaj +1 more source
Unified Description for Network Information Hiding Methods
Until now hiding methods in network steganography have been described in arbitrary ways, making them difficult to compare. For instance, some publications describe classical channel characteristics, such as robustness and bandwidth, while others describe
Mazurczyk, Wojciech +2 more
core +2 more sources
High capacity steganographic method based upon JPEG [PDF]
The two most important aspects of any image-based steganographic system are the quality of the stegoimage and the capacity of the cover image. This paper proposes a novel and high capacity steganographic approach based on Discrete Cosine Transformation (
Al-Mohammad, A, Ghinea, G, Hierons, RM
core +1 more source
Information-theoretic analysis of information hiding [PDF]
Summary: An information-theoretic analysis of information hiding is presented, forming the theoretical basis for design of information-hiding systems. Information hiding is an emerging research area which encompasses applications such as copyright protection for digital media, watermarking, fingerprinting, steganography, and data embedding.
Moulin, Pierre, O'Sullivan, Joseph A.
openaire +2 more sources
Mechanisms of parasite‐mediated disruption of brain vessels
Parasites can affect the blood vessels of the brain, often causing serious neurological problems. This review explains how different parasites interact with and disrupt these vessels, what this means for brain health, and why these processes matter. Understanding these mechanisms may help us develop better ways to prevent or treat brain infections in ...
Leonor Loira +3 more
wiley +1 more source
Anonymity and Information Hiding in Multiagent Systems [PDF]
We provide a framework for reasoning about information-hiding requirements in multiagent systems and for reasoning about anonymity in particular. Our framework employs the modal logic of knowledge within the context of the runs and systems framework ...
Halpern, Joseph Y., O'Neill, Kevin R.
core +6 more sources
Overview of molecular signatures of senescence and associated resources: pros and cons
Cells can enter a stress response state termed cellular senescence that is involved in various diseases and aging. Detecting these cells is challenging due to the lack of universal biomarkers. This review presents the current state of senescence identification, from biomarkers to molecular signatures, compares tools and approaches, and highlights ...
Orestis A. Ntintas +6 more
wiley +1 more source
A Novel Information Hiding Approach using Selective Quantization Technique in Video Coding
This research examines the different areas of information hiding in current and emerging video compression standards. In the subsequent sections, we provide a detailed comparison of these techniques based on partition modes, prediction units, transform ...
Joan Hau, Yiqi Tew, Li Peng Tan
doaj +1 more source

