Results 41 to 50 of about 14,519 (193)
Secure Dissemination and Protection of Raster Data using Merkle Hash Tree based Cryptowatermarking [PDF]
Due to rapid development in the Internet and other communication technologies, it becomes quite easy to copy and distribute multiple illegal copies of high value and sensitive data.
Chaudhari Sangita Santosh
doaj +1 more source
BaseFs - Basically Acailable, Soft State, Eventually Consistent Filesystem for Cluster Management [PDF]
A peer-to-peer distributed filesystem for community cloud management.
Aymerich Gubern, Marc
core +1 more source
Black bears as apex predators. American black bears can (1) produce top‐down effects on ungulates equal to or exceeding those of typical apex predators and (2) modify the spatiotemporal behaviour of other carnivores, including pumas and coyotes. We argue that the term ‘apex predator’ is highly context dependent and not a species‐wide status.
John M. Nettles +10 more
wiley +1 more source
Data management method for building internet of things based on blockchain sharding and DAG
Sharding technology can address the throughput and scalability limitations that arise when single-chain blockchain are applied in the Internet of Things (IoT).
Wenhu Zheng +6 more
doaj +1 more source
Lattice-Based Group Signatures: Achieving Full Dynamicity (and Deniability) with Ease
In this work, we provide the first lattice-based group signature that offers full dynamicity (i.e., users have the flexibility in joining and leaving the group), and thus, resolve a prominent open problem posed by previous works.
Ling, San +3 more
core +1 more source
Clustering Longitudinal Data: A Review of Methods and Software Packages
Summary Clustering of longitudinal data is becoming increasingly popular in many fields such as social sciences, business, environmental science, medicine and healthcare. However, it is often challenging due to the complex nature of the data, such as dependencies between observations collected over time, missingness, sparsity and non‐linearity, making ...
Zihang Lu
wiley +1 more source
Intelligent manufacturing security model based on improved blockchain
The Industrial Internet of Things (IIoT) plays an important role in the development of smart factories. However, the existing IIoT systems are prone to suffering from single points of failure and unable to provide stable service.
Jiahe Xu +3 more
doaj +1 more source
XML data integrity based on concatenated hash function [PDF]
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting.
Liu, B, Lu, J, Yip, YJ
core
This study employed species distribution models and corridor construction models to predict the distribution range of suitable habitats and identify the ecological corridors and key points for the Eurasian otter in Northeast China. There were 39 core habitats, 42 ecological corridors, 78 pinch points and 19 barrier points identified. Among these, 11.92%
Qingyi Wang +5 more
wiley +1 more source
Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks
Over-the-air dissemination of code updates in wireless sensor networks have been researchers’ point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of
Farzan Doroodgar +2 more
doaj +1 more source

