Results 91 to 100 of about 7,587 (272)

Authentication : can mobile environments be secured? [PDF]

open access: yes, 2013
Due to the character of the original source materials and the nature of batch digitization, quality control issues may be present in this document. Please report any quality issues you encounter to digital@library.tamu.edu, referencing the URI of the ...
Cropper, Charles Austin
core   +1 more source

Creativity and its link to epilepsy

open access: yesEpilepsia Open, EarlyView.
Abstract Creative thinking represents one of our highest‐order cognitive processes, involving multiple cortical structures and an intricate interplay between several cortical and subcortical networks. It results in novel ideas that translate to useful products or concepts. The evolutionary purpose of creativity is therefore apparent, as it advances our
Itay Tokatly Latzer, Phillip L. Pearl
wiley   +1 more source

Provable Data Integrity of Cloud Storage Service With Enhanced Security in the Internet of Things

open access: yesIEEE Access, 2019
Utilizing the cloud storage services to replace the conventional storage paradigms in the Internet of Things is becoming popular due to the huge amount of data produced by users. However, guaranteeing data integrity on the cloud is challenging since data
Jialing He   +4 more
doaj   +1 more source

Recent advances in multifunctional soft robots: A materials–structures–systems co‐design perspective for synergistic integration

open access: yesFlexMat, EarlyView.
Abstract Soft robots, engineered from highly compliant materials, offer superior adaptability and safety in unstructured environments compared to their rigid counterparts. Recent advancements, fueled by bio‐inspiration and material programmability, have led to the rapid co‐evolution of their core modules: actuation, sensing, protection, energy, and ...
Qiulei Liu   +3 more
wiley   +1 more source

Towards climate‐conscious corporate restructuring: A comparative exploration of English and Bhutanese legal frameworks

open access: yesInternational Insolvency Review, EarlyView.
Abstract This paper conducts a comparative legal analysis of corporate restructuring frameworks in England and Bhutan, examining their capacity to integrate climate variability considerations and promote sustainable business practices. It discusses the procedural mechanisms for restructuring financially distressed enterprises available under the law of
Eugenio Vaccari, Migmar Lham
wiley   +1 more source

Membership‐Making in Diverse Societies: Revisiting the Idea of Society as a Common Possession

open access: yesJournal of Applied Philosophy, EarlyView.
ABSTRACT The traditional aim of Western social democracy has been to create a society that is a ‘common possession’ of its members (in T.H. Marshall's words). Social democratic politics has therefore been both society‐making and membership‐making, orienting people to a shared society as an object of attachment and loyalty, and nurturing membership ...
Will Kymlicka
wiley   +1 more source

Transparent, Distributed, and Replicated Dynamic Provable Data Possession [PDF]

open access: yes, 2013
With the growing trend toward using outsourced storage, the problem of efficiently checking and proving data integrity needs more consideration. Starting with PDP and POR schemes, many cryptography and security researchers have addressed the problem. After the first solutions for static data, dynamic versions were developed (e.g., DPDP).
Mohammad Etemad, Alptekin Küpçü
openaire   +1 more source

Back to Work! Perceived Overqualification, Proactive Helping Behaviors, and Work Adjustment Among Reentering Mothers

open access: yesJournal of Organizational Behavior, EarlyView.
ABSTRACT In the present study, we investigate the impact of perceived overqualification on the return‐to‐work process following maternity leave. Based on Person‐Environment (P‐E) fit theory's underutilized carryover mechanism, we hypothesized that returning mothers experiencing perceived overqualification would “carry over” their excess abilities to ...
Lisa Boenke   +4 more
wiley   +1 more source

An Enhanced Cloud Network Integrity and Fair Compensation Scheme Through Data Structures and Blockchain Enforcement

open access: yesEng
The expansion of cloud-based storage has intensified concerns about integrity, security, and fair compensation for third-party auditors. Existing authentication methods often compromise privacy with high computational costs, punctuating the need for an ...
Renato Racelis Maaliw
doaj   +1 more source

Exploring production of social and economic value in social enterprises through a business model framework

open access: yesStrategic Change, EarlyView.
Abstract This study explores how social enterprises create social and economic value through business models that support ex‐offenders. The work was motivated by a request for help from an entrepreneur wishing to establish a business that supports ex‐offender rehabilitation.
Elizabeth Green   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy