Results 221 to 230 of about 834,303 (333)
Regions Security Policy (RSP) : applying regions to network security
Joshua W. Baratz
openalex +1 more source
Animal Models and Experimental Medicine, EarlyView.
Asian Federation of Laboratory Animal Science Associations (AFLAS)
wiley +1 more source
Associating cognitive abilities with naturalistic search behavior
Abstract Differences in cognitive abilities affect search behaviors, but this has mostly been observed in laboratory experiments. There is limited research on how users search for information in real‐world, naturalistic settings and how real‐world search behaviors relate to cognitive abilities.
Tung Vuong +2 more
wiley +1 more source
Enhancing IIoT security through blockchain-enabled workload analysis in fog computing environments. [PDF]
Samriya JK +7 more
europepmc +1 more source
Essential work, invisible workers: The role of digital curation in COVID‐19 Open Science
Abstract In this paper, we examine the role digital curation practices and practitioners played in facilitating open science (OS) initiatives amid the COVID‐19 pandemic. In Summer 2023, we conducted a content analysis of available information regarding 50 OS initiatives that emerged—or substantially shifted their focus—between 2020 and 2022 to address ...
Irene V. Pasquetto +2 more
wiley +1 more source
The benefits of exploring a large scenario space for future energy systems. [PDF]
Frey UJ +4 more
europepmc +1 more source
Research on the Effectiveness of Network Security Policies Based on Interrupt Time Series and Natural Language Processing [PDF]
Shuyuan You, Yichen Zhong, Jiajin Du, Guorui Zhao
openalex +1 more source
Abstract Biomass gasification technology has been extensively researched around the world; however, there is a need to evaluate the current research landscape and evolutionary direction of research in the broader context of energy transition. A systematic bibliometric analysis of the Web of Science database was performed for articles that fall within ...
Olasunkanmi Opeoluwa Adeoye +5 more
wiley +1 more source
Analysis of SD-WAN Architectures and Techniques for Efficient Traffic Control Under Transmission Constraints-Overview of Solutions. [PDF]
Dudczyk J, Sergiel M, Krygier J.
europepmc +1 more source

