Results 51 to 60 of about 3,657 (190)
A simplistic approach to keyhole plan recognition [PDF]
When applying plan recognition to Human - Computer Interaction, one must cope with users exhibiting a large amount of reactive behaviour: users that change tasks, or change strategies for achieving tasks.
Stenborg, Ola, Waern, Annika
core +1 more source
On The General Applicability of Instruction-Set Randomization [PDF]
We describe Instruction-Set Randomization (ISR), a general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoffs' principle to create OS process-specific randomized instruction sets (e.g., machine instructions ...
Boyd, Stephen W. +4 more
core +4 more sources
ABSTRACT Pulses offer significant nutritional and environmental benefits and are useful components of healthier, more sustainable diets and global food security. However, their consumption in France remains low and below the world average. Farmers face economic and technical challenges in diversifying crops, and current domestic production is ...
Gaëlle Arvisenet +7 more
wiley +1 more source
Extended Functionality in Verifiable Searchable Encryption [PDF]
. When outsourcing the storage of sensitive data to an (un-trusted) remote server, a data owner may choose to encrypt the data beforehand to preserve confidentiality.
A Sahai +19 more
core +2 more sources
Abstract INTRODUCTION This paper presents the development of a framework to assess the use and experiences of non‐pharmacological interventions (NPIs) supporting sleep, including technological and indoor environmental quality (IEQ) measures. Sleep disturbances are common in people with dementia (PwD) and increase caregiver burden.
CAM Huisman, MGLC Loomans, HSM Kort
wiley +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Fang, Liming +3 more
openaire +4 more sources
Novel Schemes for Authentication [PDF]
Authentication is one of the most basic process to provide security to any resource and application from unauthorized access. It covers two security goals confidentiality and integrity. Passwords are used as private identity for an individual.
Gupta, Vikash Kumar
core
The Effectiveness of Interventions Addressing Conspiracy Beliefs: A Meta‐Analysis
ABSTRACT Reducing conspiracy beliefs through effective interventions may help mitigate potential harmful consequences, such as vaccine hesitancy and prejudice. Therefore, a systematic literature search was conducted in Web of Science, PsycINFO, and Google Scholar for experiments testing interventions that could potentially reduce conspiracy beliefs ...
Lukasz Stasielowicz
wiley +1 more source
The public key encryption with keyword search (PEKS) scheme is a cryptographic primitive that allows a cloud server to search for a ciphertext without knowing the corresponding keyword used in the search.
Koon-Ming Chan +3 more
doaj +1 more source
Privacy-Preserving Genetic Relatedness Test [PDF]
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano +2 more
core +1 more source

