Results 61 to 70 of about 20,376 (274)
Perfectly secure steganography: hiding information in the quantum noise of a photograph
We show that the quantum nature of light can be used to hide a secret message within a photograph. Using this physical principle we achieve information-theoretic secure steganography, which had remained elusive until now.
Lavoie, Jonathan +4 more
core +2 more sources
Enabling Stochastic Dynamic Games for Robotic Swarms
This paper scales stochastic dynamic games to large swarms of robots through selective agent modeling and variable partial belief space planning. We formulate these games using a belief space variant of iterative Linear Quadratic Gaussian (iLQG). We scale to teams of 50 agents through selective modeling based on the estimated influence of agents ...
Kamran Vakil, Alyssa Pierson
wiley +1 more source
Artificial intelligence (AI) is reshaping autonomous mobile robot navigation beyond classical pipelines. This review analyzes how AI techniques are integrated into core navigation tasks, including path planning and control, localization and mapping, perception, and context‐aware decision‐making. Learning‐based, probabilistic, and soft‐computing methods
Giovanna Guaragnella +5 more
wiley +1 more source
A Provably Secure Proxy Signcryption Scheme Using Bilinear Pairings
As people in modern societies are busier than any human era and computer network has profound impact on how people work and live through fast and convenient information exchange, people need more help from each other to accomplish more work via network ...
Nai-Wei Lo, Jia-Lun Tsai
doaj +1 more source
Advancing Hardware Security Using Polymorphic and Stochastic Spin-Hall Effect Devices
Protecting intellectual property (IP) in electronic circuits has become a serious challenge in recent years. Logic locking/encryption and layout camouflaging are two prominent techniques for IP protection.
amarù +6 more
core +1 more source
ResearchConnect is an AI‐powered platform that automates researcher profiling, interdisciplinary team formation, and early‐stage research ideation. By extracting keywords from papers and web sources, it quickly clusters researchers into coherent teams and generates collaborative ideas using large language models. Validation on NSF‐funded projects shows
Akshay Vilas Jadhav +2 more
wiley +1 more source
The Politics of Framing the Student Problem: Inquiries Into Australian Civics Education, 2006–2024
ABSTRACT Recurring debates about civics, the kinds of history that should, and should not, be taught in school, and ‘standards debates’ about the ‘basics’ typically follow on the heels of recurring moral panics about the ‘declining’ state of ‘our’ education system.
Patrick O'Keeffe +2 more
wiley +1 more source
Practical Provably Secure Flooding for Blockchains
Advances in Cryptology – ASIACRYPT ...
Chen-Da Liu-Zhang +4 more
openaire +3 more sources
The pathogenesis of stress urinary incontinence (SUI) is intimately associated with injury to the external urethral sphincter (EUS). In this study, we established an SUI model induced by double vaginal distension and demonstrated that metformin treatment activated the AMPK signaling in the EUS tissue.
Yuting Xu +7 more
wiley +1 more source
Wireless body area networks (WBANs) and wireless sensor networks (WSNs) are important concepts for the Internet of Things (IoT). They have been applied to various healthcare services to ensure that users can access convenient medical services by ...
Kisung Park +6 more
doaj +1 more source

