Results 51 to 60 of about 22,366 (192)

Randomized Instruction Sets and Runtime Environments: Past Research and Future Directions [PDF]

open access: yes, 2009
Instruction set randomization offers a way to combat code-injection attacks by separating code from data (specifically, by randomizing legitimate code's execution environment).
Keromytis, Angelos D.
core   +2 more sources

Agents' Behavior and Interest Rate Model Optimization in DeFi Lending

open access: yesMathematical Finance, EarlyView.
ABSTRACT Contrasting sharply with traditional money, bond, and bond futures markets, where interest rates emerge organically from participant interactions, DeFi lending platforms employ rule‐based interest rates that are algorithmically set. Thus, the selection of an effective interest rate model (IRM) is paramount for the success of a lending protocol.
Charles Bertucci   +4 more
wiley   +1 more source

A simplistic approach to keyhole plan recognition [PDF]

open access: yes, 1995
When applying plan recognition to Human - Computer Interaction, one must cope with users exhibiting a large amount of reactive behaviour: users that change tasks, or change strategies for achieving tasks.
Stenborg, Ola, Waern, Annika
core   +1 more source

Learning to Extract Keyphrases from Text [PDF]

open access: yes, 1999
Many academic journals ask their authors to provide a list of about five to fifteen key words, to appear on the first page of each article. Since these key words are often phrases of two or more words, we prefer to call them keyphrases.
Turney, Peter
core   +3 more sources

‘PULSE FICTION’: Development of Slightly Processed Pulse‐Based Foods and Recipes to Meet the Needs of Consumers and the Agricultural Sector and Improve Food Sustainability

open access: yesNutrition Bulletin, EarlyView.
ABSTRACT Pulses offer significant nutritional and environmental benefits and are useful components of healthier, more sustainable diets and global food security. However, their consumption in France remains low and below the world average. Farmers face economic and technical challenges in diversifying crops, and current domestic production is ...
Gaëlle Arvisenet   +7 more
wiley   +1 more source

Novel Schemes for Authentication [PDF]

open access: yes, 2013
Authentication is one of the most basic process to provide security to any resource and application from unauthorized access. It covers two security goals confidentiality and integrity. Passwords are used as private identity for an individual.
Gupta, Vikash Kumar
core  

Intersections between ethics and diversity, equity, and inclusion in engineering practice: Insights from practitioners' mental models

open access: yesJournal of Engineering Education, Volume 115, Issue 1, January 2026.
Abstract Background Ethics and diversity, equity, and inclusion (DEI) are critical aspects of engineering, and connections between ethics/DEI are becoming increasingly common place in engineering education and practice. For example, many engineering professional organizations have integrated DEI into their codes of ethics.
Justin L. Hess   +2 more
wiley   +1 more source

Blockchain‐Enabled Privacy‐Preserving Access Control for EHRs Sharing With Optimized User and Attribute Revocation

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk   +2 more
wiley   +1 more source

Algorithm Diversity for Resilient Systems

open access: yes, 2019
Diversity can significantly increase the resilience of systems, by reducing the prevalence of shared vulnerabilities and making vulnerabilities harder to exploit.
A Avizienis   +10 more
core   +1 more source

Extended Functionality in Verifiable Searchable Encryption [PDF]

open access: yes, 2015
. When outsourcing the storage of sensitive data to an (un-trusted) remote server, a data owner may choose to encrypt the data beforehand to preserve confidentiality.
A Sahai   +19 more
core   +2 more sources

Home - About - Disclaimer - Privacy