Results 11 to 20 of about 2,955,878 (304)

Secure Source Coding With a Public Helper [PDF]

open access: yesIEEE Transactions on Information Theory, 2013
We consider secure multi-terminal source coding problems in the presence of a public helper. Two main scenarios are studied: 1) source coding with a helper where the coded side information from the helper is eavesdropped by an external eavesdropper; 2) triangular source coding with a helper where the helper is considered as a public terminal.
Kittipong Kittichokechai   +4 more
openaire   +4 more sources

Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation

open access: yesScientific Reports, 2023
Although numerous spatiotemporal approaches have been presented to address the problem of missing spatiotemporal data, there are still limitations in concurrently capturing the underlying spatiotemporal dependence of spatiotemporal graph data ...
Yifan Wang   +6 more
doaj   +1 more source

Expert Consensus on Primary Health Governance 2024 [PDF]

open access: yesZhongguo quanke yixue
Primary health governance is a crucial part of the national health governance system and plays a key role in achieving universal health. However, primary health governance currently faces many challenges. The Expert Consensus on Primary Health Governance
Public Health Security and Health Professional Committee of the Public Safety Science and Technology Society, General Practitioner Branch of Chinese Medical Doctor Association
doaj   +1 more source

A Security Perspective on Publication Metrics [PDF]

open access: yes, 2017
The importance of publication metrics, such as the h-index [9], has increased dramatically in recent years. Unfortunately, as Goodhart [7] already remarked: “when a measure becomes a target, it ceases to be a good measure”. And indeed: hiring, grants and tenure decisions depend more and more on performing well in publication metrics.
Hugo Jonker, Sjouke Mauw
openaire   +3 more sources

On the security of public key protocols [PDF]

open access: yesIEEE Transactions on Information Theory, 1981
Summary: Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message.
Danny Dolev, Andrew Chi-Chih Yao
openaire   +2 more sources

Attention-based spatial–temporal multi-graph convolutional networks for casualty prediction of terrorist attacks

open access: yesComplex & Intelligent Systems, 2023
At present, terrorism has become an important factor affecting world peace and development. As the time series data of terrorist attacks usually show a high degree of spatial–temporal correlation, the spatial–temporal prediction of casualties in ...
Zhiwen Hou   +3 more
doaj   +1 more source

Expert Consensus on Health Promotion Strategies for Adult Vaccination in China [PDF]

open access: yesZhongguo quanke yixue
Vaccine-preventable diseases impose a significant health burden on adults in China, highlighting urgent needs to address gaps in the current adult immunization program.
Institute for Healthy China, Tsinghua University, School of Public Health, Peking University, College of General Practice, Southern University of Science and Technology, Public Health Security and Health Professional Committee, Public Safety Science and Technology Society
doaj   +1 more source

Food security as a global public good [PDF]

open access: yes, 2018
Food security brings a number of benefits to humanity from which nobody can be excluded and which can be simultaneously enjoyed by all. An economic understanding of the concept sees food security qualify as a global public good.
Timmermann, Cristian
core   +2 more sources

Territorial Tactics: The Socio-spatial Significance of Private Policing Strategies in Cape Town [PDF]

open access: yes, 2014
This paper analyses the policing strategies of private security companies operating in urban space. An existing literature has considered the variety of ways that territory becomes of fundamental importance in the work of public police forces.
Brewer J.   +16 more
core   +2 more sources

Person Re-Identification Method Based on Dual Descriptor Feature Enhancement

open access: yesEntropy, 2023
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy