Results 91 to 100 of about 10,571 (279)

A PEKS-Based NDN Strategy for Name Privacy

open access: yesFuture Internet, 2020
Named Data Networking (NDN), where addressable content name is used, is considered as a candidate of next-generation Internet architectures. NDN routers use In-Network cache to replicate and store passing packets to make faster content delivery.
Kyi Thar Ko   +2 more
doaj   +1 more source

Clinical, Behavioral and Neuroradiological Phenotype in an Italian Cohort of Patients With Xia Gibbs Syndrome: A Multicenter Cross‐Sectional Study and Systematic Literature Review

open access: yesAmerican Journal of Medical Genetics Part A, EarlyView.
ABSTRACT Heterozygous variants in the AHDC1 gene are associated with Xia Gibbs Syndrome (XGS), a genetic disorder with a highly variable phenotype. Cognitive impairment, motor delay, language delay, neonatal hypotonia, and sleep apnea are considered “cardinal” signs of the disease.
Giulia Cinelli   +18 more
wiley   +1 more source

Beyond Robodebt: Media Representations of Welfare and Fraud Before and After the Robodebt Royal Commission

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT Australia's Robodebt scheme, an automated debt recovery program introduced in 2016, was exposed by the Robodebt Royal Commission (RC) as a serious failure of public administration and source of significant harm for thousands of Australians. Through a critical discourse analysis (CDA) of Australian news media, this study explores whether the RC'
Rebecca Coleman‐Hicks   +1 more
wiley   +1 more source

A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks

open access: yesSensors, 2019
Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data
Binrui Zhu   +5 more
doaj   +1 more source

Designated Server Certificateless Deniably Authenticated Encryption With Keyword Search

open access: yesIEEE Access, 2019
In email system, the cryptography technology has been used to defend email secrets, so it is important to search specific encrypted emails on cloud sever without local decryption.
Yulei Zhang   +3 more
doaj   +1 more source

Context‐centric proactive information delivery for Knowledge Work support: Opportunities, challenges, and directions. An Annual Review of Information Science and Technology (ARIST)

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract Context‐centric proactive information delivery (PID) is a relatively underexplored domain within recommender systems (RS) aimed at enhancing Knowledge Workers' productivity by proactively providing relevant information during digital tasks.
Mahta Bakhshizadeh   +4 more
wiley   +1 more source

A dancing bear, a colleague, or a sharpened toolbox? The cautious adoption of generative artificial intelligence technologies in digital humanities research

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract The emergence of generative artificial intelligence (GenAI) is reshaping the research landscape and carries significant implications for Digital Humanities (DH), a field long intertwined with computational methods and technologies. This study examines how DH scholars are adopting and critically evaluating GenAI in their research. Drawing on an
Rongqian Ma, Meredith Dedema, Andrew Cox
wiley   +1 more source

Developing a critical caste analysis within information science and technology: A research review: An annual review of information science and technology paper

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract Caste—an ascriptive social hierarchy in South Asia and its diaspora—is a globalized phenomenon. Recent caste‐based discrimination, particularly in technology companies and anti‐caste efforts to address it, has compelled academia, policy, and the technology industry to better understand contemporary mechanics of caste.
Nayana Kirasur, Britt Paris
wiley   +1 more source

ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments

open access: yes, 2013
Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of ...
Asghar, Muhammad Rizwan   +3 more
core  

Delineating gender/sex‐related studies through bibliometric analysis

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract The multidisciplinary and socially grounded nature of Women's/Gender/Feminist Studies poses unique challenges for bibliometric analysis, as it extends beyond conventional disciplinary boundaries. This paper makes three key contributions: (1) We propose a novel retrieval method for constructing a corpus of scholarly documents in research areas ...
Natsumi S. Shokida   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy