Results 51 to 60 of about 22,366 (192)
Randomized Instruction Sets and Runtime Environments: Past Research and Future Directions [PDF]
Instruction set randomization offers a way to combat code-injection attacks by separating code from data (specifically, by randomizing legitimate code's execution environment).
Keromytis, Angelos D.
core +2 more sources
Agents' Behavior and Interest Rate Model Optimization in DeFi Lending
ABSTRACT Contrasting sharply with traditional money, bond, and bond futures markets, where interest rates emerge organically from participant interactions, DeFi lending platforms employ rule‐based interest rates that are algorithmically set. Thus, the selection of an effective interest rate model (IRM) is paramount for the success of a lending protocol.
Charles Bertucci +4 more
wiley +1 more source
A simplistic approach to keyhole plan recognition [PDF]
When applying plan recognition to Human - Computer Interaction, one must cope with users exhibiting a large amount of reactive behaviour: users that change tasks, or change strategies for achieving tasks.
Stenborg, Ola, Waern, Annika
core +1 more source
Learning to Extract Keyphrases from Text [PDF]
Many academic journals ask their authors to provide a list of about five to fifteen key words, to appear on the first page of each article. Since these key words are often phrases of two or more words, we prefer to call them keyphrases.
Turney, Peter
core +3 more sources
ABSTRACT Pulses offer significant nutritional and environmental benefits and are useful components of healthier, more sustainable diets and global food security. However, their consumption in France remains low and below the world average. Farmers face economic and technical challenges in diversifying crops, and current domestic production is ...
Gaëlle Arvisenet +7 more
wiley +1 more source
Novel Schemes for Authentication [PDF]
Authentication is one of the most basic process to provide security to any resource and application from unauthorized access. It covers two security goals confidentiality and integrity. Passwords are used as private identity for an individual.
Gupta, Vikash Kumar
core
Abstract Background Ethics and diversity, equity, and inclusion (DEI) are critical aspects of engineering, and connections between ethics/DEI are becoming increasingly common place in engineering education and practice. For example, many engineering professional organizations have integrated DEI into their codes of ethics.
Justin L. Hess +2 more
wiley +1 more source
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk +2 more
wiley +1 more source
Algorithm Diversity for Resilient Systems
Diversity can significantly increase the resilience of systems, by reducing the prevalence of shared vulnerabilities and making vulnerabilities harder to exploit.
A Avizienis +10 more
core +1 more source
Extended Functionality in Verifiable Searchable Encryption [PDF]
. When outsourcing the storage of sensitive data to an (un-trusted) remote server, a data owner may choose to encrypt the data beforehand to preserve confidentiality.
A Sahai +19 more
core +2 more sources

