Results 151 to 160 of about 548,955 (324)
Combined Software and Hardware Attacks on the Java Card Control Flow [PDF]
Guillaume Bouffard +2 more
openalex +1 more source
Secure Electronic Cards in Public Services [PDF]
The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patient's medical history and payment for private ...
Catalin BOJA +3 more
core
Another Four Women: AfroCubana Entrepreneurs as Womanist Praxis
ABSTRACT This article is focused on four Black women entrepreneurs in Cuba's lucrative bed and breakfast home‐based tourism economy, asking: (1) what intersectional factors facilitated their entrepreneurial enterprises, (2) how they conceptualize success, and (3) how their narratives illuminate patterns involving gendered race in the country's ...
L. Kaifa Roland
wiley +1 more source
ABSTRACT Consumers frequently share service failures, often leading to brand avoidance. Existing research focuses on service‐related factors that emerge during or after the encounter, leaving a critical gap in understanding how pre‐service factors influence reactions.
Bijit Ghosh
wiley +1 more source
Forgotten Family Relationships: How Incarcerated Brothers Experience Sibling Support
ABSTRACT Objective We explore how incarcerated brothers experience support from their non‐incarcerated siblings. Background Sibling incarceration is the most common type of family member incarceration, with more than one‐quarter of U.S. adults enduring a sibling's incarceration (and, most commonly, a brother's incarceration).
Estéfani Marín +2 more
wiley +1 more source
Purpose – This study investigates the leadership strategies of school principals in implementing data-driven planning integrated with religious values, addressing a critical gap in educational leadership literature.
Destisari Nurbani +2 more
doaj +1 more source
Surface Adhesion Engineering for Armored Metasurfaces and Beyond
Targeting primary causes of dysfunctionality in optical systems, an “armored” metasurface is developed based on Persson's model and Hertzian theory, enabling anti‐dust, anti‐scratch, anti‐impact, and anti‐water, heat resistance capabilities, alongside excellent optical antireflection performance.
Lianwei Chen +10 more
wiley +1 more source
Intelligent Feedback for Individualized Introductory Programming Exercises
ABSTRACT This paper proposes a method to improve programming instruction in an interdisciplinary Bachelor of Science and Technology program by integrating Artificial Intelligence (AI) into the code assessment process. Programming skills are a fundamental part of Engineering and Computer Science degrees.
Francisco de Assis Zampirolli +3 more
wiley +1 more source
The ultimate control flow transfer in a Java based smart card
Guillaume Bouffard, Jean‐Louis Lanet
openalex +2 more sources
Abstract Despite calls for wider inclusion of diverse actors in conservation management, researchers tend to lump actors together into one group, potentially overlooking heterogeneity within the groups themselves—in turn, hampering inclusiveness. The risk of stereotyping social actors and oversimplifying their differentiated preferences for Nature's ...
Milena Gross +5 more
wiley +1 more source

