Results 91 to 100 of about 10,571 (279)
A PEKS-Based NDN Strategy for Name Privacy
Named Data Networking (NDN), where addressable content name is used, is considered as a candidate of next-generation Internet architectures. NDN routers use In-Network cache to replicate and store passing packets to make faster content delivery.
Kyi Thar Ko +2 more
doaj +1 more source
ABSTRACT Heterozygous variants in the AHDC1 gene are associated with Xia Gibbs Syndrome (XGS), a genetic disorder with a highly variable phenotype. Cognitive impairment, motor delay, language delay, neonatal hypotonia, and sleep apnea are considered “cardinal” signs of the disease.
Giulia Cinelli +18 more
wiley +1 more source
ABSTRACT Australia's Robodebt scheme, an automated debt recovery program introduced in 2016, was exposed by the Robodebt Royal Commission (RC) as a serious failure of public administration and source of significant harm for thousands of Australians. Through a critical discourse analysis (CDA) of Australian news media, this study explores whether the RC'
Rebecca Coleman‐Hicks +1 more
wiley +1 more source
A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks
Wireless sensor networks (WSN) generally utilize cloud computing to store and process sensing data in real time, namely, cloud-assisted WSN. However, the cloud-assisted WSN faces new security challenges, particularly outsourced data confidentiality. Data
Binrui Zhu +5 more
doaj +1 more source
Designated Server Certificateless Deniably Authenticated Encryption With Keyword Search
In email system, the cryptography technology has been used to defend email secrets, so it is important to search specific encrypted emails on cloud sever without local decryption.
Yulei Zhang +3 more
doaj +1 more source
Abstract Context‐centric proactive information delivery (PID) is a relatively underexplored domain within recommender systems (RS) aimed at enhancing Knowledge Workers' productivity by proactively providing relevant information during digital tasks.
Mahta Bakhshizadeh +4 more
wiley +1 more source
Abstract The emergence of generative artificial intelligence (GenAI) is reshaping the research landscape and carries significant implications for Digital Humanities (DH), a field long intertwined with computational methods and technologies. This study examines how DH scholars are adopting and critically evaluating GenAI in their research. Drawing on an
Rongqian Ma, Meredith Dedema, Andrew Cox
wiley +1 more source
Abstract Caste—an ascriptive social hierarchy in South Asia and its diaspora—is a globalized phenomenon. Recent caste‐based discrimination, particularly in technology companies and anti‐caste efforts to address it, has compelled academia, policy, and the technology industry to better understand contemporary mechanics of caste.
Nayana Kirasur, Britt Paris
wiley +1 more source
ESPOON$_{{ERBAC}}$: Enforcing Security Policies In Outsourced Environments
Data outsourcing is a growing business model offering services to individuals and enterprises for processing and storing a huge amount of data. It is not only economical but also promises higher availability, scalability, and more effective quality of ...
Asghar, Muhammad Rizwan +3 more
core
Delineating gender/sex‐related studies through bibliometric analysis
Abstract The multidisciplinary and socially grounded nature of Women's/Gender/Feminist Studies poses unique challenges for bibliometric analysis, as it extends beyond conventional disciplinary boundaries. This paper makes three key contributions: (1) We propose a novel retrieval method for constructing a corpus of scholarly documents in research areas ...
Natsumi S. Shokida +2 more
wiley +1 more source

