Results 41 to 50 of about 14,519 (193)

Secure Dissemination and Protection of Raster Data using Merkle Hash Tree based Cryptowatermarking [PDF]

open access: yesITM Web of Conferences, 2020
Due to rapid development in the Internet and other communication technologies, it becomes quite easy to copy and distribute multiple illegal copies of high value and sensitive data.
Chaudhari Sangita Santosh
doaj   +1 more source

BaseFs - Basically Acailable, Soft State, Eventually Consistent Filesystem for Cluster Management [PDF]

open access: yes, 2016
A peer-to-peer distributed filesystem for community cloud management.
Aymerich Gubern, Marc
core   +1 more source

The American Black Bear (Ursus americanus) as an Apex Predator: Investigating the Ecological Role of the World's Most Abundant Large Carnivore

open access: yesMammal Review, EarlyView.
Black bears as apex predators. American black bears can (1) produce top‐down effects on ungulates equal to or exceeding those of typical apex predators and (2) modify the spatiotemporal behaviour of other carnivores, including pumas and coyotes. We argue that the term ‘apex predator’ is highly context dependent and not a species‐wide status.
John M. Nettles   +10 more
wiley   +1 more source

Data management method for building internet of things based on blockchain sharding and DAG

open access: yesInternet of Things and Cyber-Physical Systems
Sharding technology can address the throughput and scalability limitations that arise when single-chain blockchain are applied in the Internet of Things (IoT).
Wenhu Zheng   +6 more
doaj   +1 more source

Lattice-Based Group Signatures: Achieving Full Dynamicity (and Deniability) with Ease

open access: yes, 2018
In this work, we provide the first lattice-based group signature that offers full dynamicity (i.e., users have the flexibility in joining and leaving the group), and thus, resolve a prominent open problem posed by previous works.
Ling, San   +3 more
core   +1 more source

Clustering Longitudinal Data: A Review of Methods and Software Packages

open access: yesInternational Statistical Review, Volume 93, Issue 3, Page 425-458, December 2025.
Summary Clustering of longitudinal data is becoming increasingly popular in many fields such as social sciences, business, environmental science, medicine and healthcare. However, it is often challenging due to the complex nature of the data, such as dependencies between observations collected over time, missingness, sparsity and non‐linearity, making ...
Zihang Lu
wiley   +1 more source

Intelligent manufacturing security model based on improved blockchain

open access: yesMathematical Biosciences and Engineering, 2020
The Industrial Internet of Things (IIoT) plays an important role in the development of smart factories. However, the existing IIoT systems are prone to suffering from single points of failure and unable to provide stable service.
Jiahe Xu   +3 more
doaj   +1 more source

XML data integrity based on concatenated hash function [PDF]

open access: yes, 2009
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting.
Liu, B, Lu, J, Yip, YJ
core  

Identification of Ecological Corridors for Semi‐Aquatic Vertebrates: A Case of the Eurasian Otter in Northeast China

open access: yesEcology and Evolution, Volume 15, Issue 11, November 2025.
This study employed species distribution models and corridor construction models to predict the distribution range of suitable habitats and identify the ecological corridors and key points for the Eurasian otter in Northeast China. There were 39 core habitats, 42 ecological corridors, 78 pinch points and 19 barrier points identified. Among these, 11.92%
Qingyi Wang   +5 more
wiley   +1 more source

Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks

open access: yesSensors, 2014
Over-the-air dissemination of code updates in wireless sensor networks have been researchers’ point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of
Farzan Doroodgar   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy