Results 161 to 170 of about 1,527 (301)
Reading Nietzsche in an Age of Conspiracy Theories
Abstract This essay considers Friedrich Nietzsche's critique of Christian morality as a template for interpreting the epistemology of modern conspiracy theorists. The first section elucidates Nietzsche's notion of ressentiment as it can be applied to contemporary conspiracism. The effectiveness of this comparative assessment thus raises the question of
J.W. Olson
wiley +1 more source
Certificateless data integrity auditing with sparse Merkle trees for the cloud-edge environment. [PDF]
Du R, Wang Z, Shen J.
europepmc +1 more source
Patients with isolated LPS demonstrated a lower likelihood of EGJ disruption, pathologic GERD, and abnormal Milan score. The Milan score performed similarly well in the identification of GERD in both LPS and typical symptoms. The Milan score could therefore be used as an upfront test in LPS patients.
Stefano Siboni +26 more
wiley +1 more source
Fully secure and hierarchical identity based signature for automatic dependent surveillance broadcast systems. [PDF]
Yu Q.
europepmc +1 more source
Abstract Standard decision theory ranks risky prospects by their expected utility. This ranking does not change if the values of all possible outcomes are uniformly shifted or dilated. Similarly, if the values of the outcomes are negated, the ranking of prospects by their expected utility is reversed.
Zachary Goodsell
wiley +1 more source
ThreatFedChainAI: an adaptive edge blockchain architecture for big data-driven threat analytics in IoT networks. [PDF]
Ashwini N +5 more
europepmc +1 more source
Alternating Product Ciphers: A Case for Provable Security Comparisons\n (extended abstract) [PDF]
John O. Pliam
openalex +1 more source
Provably Secure Metering Scheme
identifier:oai:t2r2.star.titech.ac.jp ...
openaire

