Results 61 to 70 of about 1,717,630 (292)
Security models for trusting network appliances [PDF]
A significant characteristic of pervasive computing is the need for secure interactions between highly mobile entities and the services in their environment.
English, Colin +4 more
core +1 more source
3D Bioprinting of Thick Adipose Tissues with Integrated Vascular Hierarchies
An advanced 3D bioprinting technique is used here to create thick adipose tissues with a central, vessel and extensive branching. The construct is made using alginate, gelatin and collagen‐based bioinks. Flow through the complex vessel network is demonstrated as well as its successful integration with a femoral artery following implantation in a rat ...
Idit Goldfracht +5 more
wiley +1 more source
Deep Spatio-Temporal Graph Attention Network for Street-Level 110 Call Incident Prediction
Recent advancements in crime prediction have increasingly focused on street networks, which offer finer granularity and a closer reflection of real-world urban dynamics.
Jinguang Sui, Peng Chen, Haishuo Gu
doaj +1 more source
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs ...
Asokan, N. +6 more
core +1 more source
Structurally Colored Physically Unclonable Functions with Ultra‐Rich and Stable Encoding Capacity
This study reports a design strategy for generating bright‐field resolvable physically unclonable functions with extremely rich encoding capacity coupled with outstanding thermal and chemical stability. The optical response emerges from thickness‐dependent structural color formation in ZnO features, which are fabricated by physical vapor deposition ...
Abidin Esidir +8 more
wiley +1 more source
Graph Representation Learning for Street-Level Crime Prediction
In contemporary research, the street network emerges as a prominent and recurring theme in crime prediction studies. Meanwhile, graph representation learning shows considerable success, which motivates us to apply the methodology to crime prediction ...
Haishuo Gu, Jinguang Sui, Peng Chen
doaj +1 more source
The fabrication of a cellularized, multilayered 3D printed cylindrical model comprising hybrid bioinks inspired by the natural extracellular environment as an approach to artery mimetics, is presented. Using embedded bioprinting, interlayer crosslinking of self‐supporting concentric cylinders is achieved.
Uxue Aizarna‐Lopetegui +7 more
wiley +1 more source
Resource allocation for spectrum-leasing based CRN with delay-sensitive traffic
In this paper, cooperative resource allocation strategies are characterized for a spectrum-leasing based cognitive radio network (CRN), where the primary system leases the licensed band to the secondary system for a fraction of time in exchange for the ...
Yanbo Ma, Xiao Yin, Xiao Yang, Qiang Liu
doaj +1 more source
In a variety of settings, some payoff-relevant item spreads along a network of connected individuals. In some cases, the item will benefit those who receive it (for example, a music download, a stock tip, news about a new research funding source, etc ...
Larson, Nathan
core +1 more source
Grayscale Image Authentication using Neural Hashing
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core +2 more sources

