Results 41 to 50 of about 3,148 (188)

Randomized Instruction Sets and Runtime Environments: Past Research and Future Directions [PDF]

open access: yes, 2009
Instruction set randomization offers a way to combat code-injection attacks by separating code from data (specifically, by randomizing legitimate code's execution environment).
Keromytis, Angelos D.
core   +2 more sources

Eye Movements, Item Modality, and Multimodal Second Language Vocabulary Learning: Processing and Outcomes

open access: yesLanguage Learning, Volume 76, Issue 2, Page 528-564, June 2026.
Abstract This study examined second language vocabulary processing and learning in reading only (RO) versus reading while listening (RWL). 119 English learners read or read‐while‐listening to a story embedded with 25 pseudowords, 10 times each, and had their eye movements tracked.
Jonathan Malone   +3 more
wiley   +1 more source

Combining Relational Algebra, SQL, Constraint Modelling, and Local Search

open access: yes, 2006
The goal of this paper is to provide a strong integration between constraint modelling and relational DBMSs. To this end we propose extensions of standard query languages such as relational algebra and SQL, by adding constraint modelling capabilities to ...
Aarts   +8 more
core   +2 more sources

On The General Applicability of Instruction-Set Randomization [PDF]

open access: yes, 2009
We describe Instruction-Set Randomization (ISR), a general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoffs' principle to create OS process-specific randomized instruction sets (e.g., machine instructions ...
Boyd, Stephen W.   +4 more
core   +4 more sources

Exploring Frequency Reports as Described by Judges in Timely and Delayed Canadian Child Sexual Abuse Cases

open access: yesApplied Cognitive Psychology, Volume 40, Issue 3, May/June 2026.
ABSTRACT Child sexual abuse (CSA) cases can involve multiple similar incidents over a long duration. Complainants can either report the offence shortly after it occurs, leading to a brief delay between the end of the abuse and court hearing (timely delay; CSA) or the court hearing takes place 2 or more years after its occurrence (delayed; historical ...
Fiza Hasan   +2 more
wiley   +1 more source

Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2023
With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to achieve the above goal.
Liang Yan   +5 more
doaj   +1 more source

Certificateless Searchable Encryption Scheme in Multi-User Environment

open access: yesCryptography, 2022
Searchable encryption technology enables users to access data that has been made publicly encrypted without divulging the original content. The majority of the currently available multi-user certificateless searchable encryption technologies are based on
Tao Feng, Jiewen Si
doaj   +1 more source

Privacy-Preserving Genetic Relatedness Test [PDF]

open access: yes, 2016
An increasing number of individuals are turning to Direct-To-Consumer (DTC) genetic testing to learn about their predisposition to diseases, traits, and/or ancestry. DTC companies like 23andme and Ancestry.com have started to offer popular and affordable
De Cristofaro, Emiliano   +2 more
core   +1 more source

Double‐Edged Sword of Social Media Algorithms: Assessing the Risks to University Cybersecurity and Student Data Privacy

open access: yesEngineering Reports, Volume 8, Issue 5, May 2026.
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley   +1 more source

APRT – Another Pattern Recognition Tool [PDF]

open access: yes, 2017
Understanding and using Design Patterns improves software quality through better comprehension of programs for both experienced developers and relative novices.
Bates, Christopher, Robinson, Ashley
core   +2 more sources

Home - About - Disclaimer - Privacy