Results 11 to 20 of about 2,955,878 (304)
Secure Source Coding With a Public Helper [PDF]
We consider secure multi-terminal source coding problems in the presence of a public helper. Two main scenarios are studied: 1) source coding with a helper where the coded side information from the helper is eavesdropped by an external eavesdropper; 2) triangular source coding with a helper where the helper is considered as a public terminal.
Kittipong Kittichokechai +4 more
openaire +4 more sources
Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation
Although numerous spatiotemporal approaches have been presented to address the problem of missing spatiotemporal data, there are still limitations in concurrently capturing the underlying spatiotemporal dependence of spatiotemporal graph data ...
Yifan Wang +6 more
doaj +1 more source
Expert Consensus on Primary Health Governance 2024 [PDF]
Primary health governance is a crucial part of the national health governance system and plays a key role in achieving universal health. However, primary health governance currently faces many challenges. The Expert Consensus on Primary Health Governance
Public Health Security and Health Professional Committee of the Public Safety Science and Technology Society, General Practitioner Branch of Chinese Medical Doctor Association
doaj +1 more source
A Security Perspective on Publication Metrics [PDF]
The importance of publication metrics, such as the h-index [9], has increased dramatically in recent years. Unfortunately, as Goodhart [7] already remarked: “when a measure becomes a target, it ceases to be a good measure”. And indeed: hiring, grants and tenure decisions depend more and more on performing well in publication metrics.
Hugo Jonker, Sjouke Mauw
openaire +3 more sources
On the security of public key protocols [PDF]
Summary: Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message.
Danny Dolev, Andrew Chi-Chih Yao
openaire +2 more sources
At present, terrorism has become an important factor affecting world peace and development. As the time series data of terrorist attacks usually show a high degree of spatial–temporal correlation, the spatial–temporal prediction of casualties in ...
Zhiwen Hou +3 more
doaj +1 more source
Expert Consensus on Health Promotion Strategies for Adult Vaccination in China [PDF]
Vaccine-preventable diseases impose a significant health burden on adults in China, highlighting urgent needs to address gaps in the current adult immunization program.
Institute for Healthy China, Tsinghua University, School of Public Health, Peking University, College of General Practice, Southern University of Science and Technology, Public Health Security and Health Professional Committee, Public Safety Science and Technology Society
doaj +1 more source
Food security as a global public good [PDF]
Food security brings a number of benefits to humanity from which nobody can be excluded and which can be simultaneously enjoyed by all. An economic understanding of the concept sees food security qualify as a global public good.
Timmermann, Cristian
core +2 more sources
Territorial Tactics: The Socio-spatial Significance of Private Policing Strategies in Cape Town [PDF]
This paper analyses the policing strategies of private security companies operating in urban space. An existing literature has considered the variety of ways that territory becomes of fundamental importance in the work of public police forces.
Brewer J. +16 more
core +2 more sources
Person Re-Identification Method Based on Dual Descriptor Feature Enhancement
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin +5 more
doaj +1 more source

