Results 61 to 70 of about 27,872 (320)

Durability of Soft Pneumatic Actuators: A Review and Benchmarking Protocol

open access: yesAdvanced Robotics Research, EarlyView.
Lack of durability is a key challenge hindering the broad scale adoption of soft pneumatic actuators (SPAs) in automation industries. This review provides a comprehensive overview of existing research on SPA durability, introduces a standardized durability benchmarking protocol to consolidate the testing of SPAs, and outlines promising directions for ...
Dickson Chiu Yu Wong   +2 more
wiley   +1 more source

Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency [PDF]

open access: yes, 2017
Recently, several practical attacks raised serious concerns over the security of searchable encryption. The attacks have brought emphasis on forward privacy, which is the key concept behind solutions to the adaptive leakage-exploiting attacks, and will ...
Dong, Changyu   +4 more
core   +1 more source

Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI)

open access: yes, 2013
Participatory sensing is emerging as an innovative computing paradigm that targets the ubiquity of always-connected mobile phones and their sensing capabilities.
De Cristofaro, Emiliano   +1 more
core   +1 more source

Multimodal Human–Robot Interaction Using Human Pose Estimation and Local Large Language Models

open access: yesAdvanced Robotics Research, EarlyView.
A multimodal human–robot interaction framework integrates human pose estimation (HPE) and a large language model (LLM) for gesture‐ and voice‐based robot control. Speech‐to‐text (STT) enables voice command interpretation, while a safety‐aware arbitration mechanism prioritizes gesture input for rapid intervention.
Nasiru Aboki   +2 more
wiley   +1 more source

Auctions with Heterogeneous Items and Budget Limits

open access: yes, 2012
We study individual rational, Pareto optimal, and incentive compatible mechanisms for auctions with heterogeneous items and budget limits. For multi-dimensional valuations we show that there can be no deterministic mechanism with these properties for ...
L. Ausubel   +6 more
core   +1 more source

Mapping Genetic Regulation of Transcription to Identify Functional Variants and Genes Associated with Pancreatic Cancer Risk

open access: yesAdvanced Science, EarlyView.
Integration of a pancreatic eQTL map with a GWAS meta‐analysis identifies 82 putative functional variants and 15 genes. The association between rs11102484 and pancreatic cancer risk is observed in a total of 5699 cases and 8467 controls. The G allele of rs11102484 weakens ZNF263 binding and the silencer‐promoter interaction, thereby increasing ST7L ...
Xiaoyang Wang   +14 more
wiley   +1 more source

Fine-Grained Ranked Multi-Keyword Search Over Hierarchical Data for IoT-Oriented Health System

open access: yesIEEE Access, 2019
With the rapid advance of the Internet of Things (IoT) and cloud computing technologies, the IoT-oriented health is expected to greatly improve the quality of healthcare service.
Jianfei Sun, Shengnan Hu, Xuyun Nie
doaj   +1 more source

A lattice framework for pricing display advertisement options with the stochastic volatility underlying model

open access: yes, 2015
Advertisement (abbreviated ad) options are a recent development in online advertising. Simply, an ad option is a first look contract in which a publisher or search engine grants an advertiser a right but not obligation to enter into transactions to ...
Chen, Bowei, Wang, Jun
core   +1 more source

Identifying Cytokine Motif‐Containing, Immunomodulatory Bacterial Proteins in Human Gut Microbiome

open access: yesAdvanced Science, EarlyView.
By building and constructing HMM (Upper left, blue), the authors identify CMCPs in bacteria genomes and CRC related metagenomes and enriched CRC‐related CMCPs (Upper right, blue). They analyze sequence and structural similarity of hits (Lower left, green), test function with engineered EcN delivered to tumors in a mouse tumor model (Lower right, pink ...
Ziyu Wang   +12 more
wiley   +1 more source

Verifiable Multi-Authority Attribute-Based Encryption with Keyword Search Based on MLWE

open access: yesCryptography
Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access ...
Saba Karimani, Taraneh Eghlidos
doaj   +1 more source

Home - About - Disclaimer - Privacy