Results 71 to 80 of about 4,231 (188)

Generative AI and the Future of Musical Diversity

open access: yesTopics in Cognitive Science, EarlyView.
Abstract I argue that the current proliferation of generative artificial intelligence (AI) represents a new stage in a longer historical process of distancing humans from their unique individual psyches and of reducing participation and cultural diversity in music. The argument consists of six parts: (1) reiterating the uniqueness of individual psyches,
Dor Shilton
wiley   +1 more source

Robust and Scalable Data Access Control in D2D Communications

open access: yesIEEE Access, 2018
As an emerging technique in 5G cellular networks, D2D communication efficiently utilizes the available resources. However, the concerns of data security, identity privacy, and system scalability have not been sufficiently addressed.
Qi Li   +4 more
doaj   +1 more source

Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners [PDF]

open access: yes, 2015
The k-nearest neighbors (k-NN) algorithm is a popular and effective classification algorithm. Due to its large storage and computational requirements, it is suitable for cloud outsourcing.
Li, Frank, Paxson, Vern, Shin, Richard
core  

SMAA‐Based FITradeoff: An Efficient Framework for Pairwise Elicitation in Multicriteria Decision Analysis

open access: yesJournal of Multi-Criteria Decision Analysis, Volume 33, Issue 2, August 2026.
ABSTRACT The Flexible and Interactive Tradeoff Elicitation (FITradeoff) method is a Multi‐Attribute Decision‐Making (MADM) approach designed to capture the preferences of a Decision Maker (DM) while minimising cognitive effort. To reduce the frequency of interactions and optimise the preference elicitation process, this paper introduces an innovative ...
Qian Zhao   +3 more
wiley   +1 more source

Traceable Ciphertext‐Policy Attribute‐Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud [PDF]

open access: yesWireless Communications and Mobile Computing, 2018
In cloud‐assisted electronic health care (eHealth) systems, a patient can enforce access control on his/her personal health information (PHI) in a cryptographic way by employing ciphertext‐policy attribute‐based encryption (CP‐ABE) mechanism. There are two features worthy of consideration in real eHealth applications.
Qi Li   +3 more
openaire   +1 more source

Organising Inequality: Viral Contamination of Healthcare Policies During the COVID‐19 Pandemic in Wales

open access: yesTransactions of the Institute of British Geographers, Volume 51, Issue 2, June 2026.
ABSTRACT This article explores the role of the COVID‐19 virus in changing healthcare policies in Wales and their effects on pandemic inequalities. It draws on the analysis of policy documents and key informant interviews with government and healthcare officials in Wales conducted during the cross‐European study on the varying impacts of pandemic ...
Sergei Shubin, Diana Beljaars
wiley   +1 more source

Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing

open access: yesTongxin xuebao, 2021
General ciphertext-policy attribute-based encryption (CP-ABE) provides fine-grained access control for data sharing in cloud computing, but its plaintext formed access policy may cause leakage of private and sensitive data.And revoking a malicious user ...
Jiawei ZHANG   +3 more
doaj   +2 more sources

Toward Carbon Accounting and Circular Harmony in Shipping Corporations: A Systematic Bibliometric Review

open access: yesBusiness Strategy and the Environment, Volume 35, Issue 4, Page 4961-4984, May 2026.
ABSTRACT This study examines how carbon accounting can be used to govern, not merely report, circular economy principles in shipping corporations. Grounded in institutional theory and aligned with the UN 2030 Agenda, this study introduces circular harmony as an accounting design principle: Circular interventions are embedded in a single well‐to‐wake ...
Assunta Di Vaio   +2 more
wiley   +1 more source

An Efficient Revocable Attribute-Based Signcryption Scheme With Outsourced Unsigncryption in Cloud Computing

open access: yesIEEE Access, 2020
In this paper, we present an efficient revocable signcryption (CP-ABSC) with outsourced unsigncryption scheme based on ciphertext-policy attribute based encryption (CP-ABE) to secure the data sharing in cloud computing that require access control, data ...
Ningzhi Deng   +3 more
doaj   +1 more source

A dialogic theoretical foundation for integrating generative AI into pedagogical design

open access: yesBritish Journal of Educational Technology, Volume 57, Issue 3, Page 639-654, May 2026.
Generative AI presents a profound challenge to the existing structures and purposes of education. It forces us to reconsider not only how we teach and learn but also, more fundamentally, what education is for. This conceptual paper argues that, in order to integrate AI into education in a way that can meet the major challenges facing humanity, ranging ...
Rupert Wegerif, Imogen Casebourne
wiley   +1 more source

Home - About - Disclaimer - Privacy