Results 101 to 110 of about 94,999 (279)
ABSTRACT As a rapidly evolving sub‐field of computer‐assisted language learning, informal digital learning of English (IDLE) has become a significant catalyst for linguistic, affective, and pedagogical development among English as a second language (L2) learners.
Yue Zhang
wiley +1 more source
Medical Knowledge Integration Into Reinforcement Learning Algorithms for Dynamic Treatment Regimes
Summary The goal of precision medicine is to provide individualised treatment at each stage of chronic diseases, a concept formalised by dynamic treatment regimes (DTR). These regimes adapt treatment strategies based on decision rules learned from clinical data to enhance therapeutic effectiveness.
Sophia Yazzourh +3 more
wiley +1 more source
Unbiased risk estimation method for covariance estimation [PDF]
We consider a model selection estimator of the covariance of a random process. Using the Unbiased Risk Estimation (URE) method, we build an estimator of the risk which allows to select an estimator in a collection of model.
Chabriac, Claudie +2 more
core +2 more sources
How Do People Conceptualize Narcissism and Narcissistic Individuals?
ABSTRACT Introduction Although past decades have seen notable advances in the conceptualization and assessment of narcissism, scholarship examining lay conceptualizations of the construct remains limited. Method We report two studies utilizing bottom‐up, participant‐driven methodologies to examine public understandings of narcissism and narcissistic ...
Sarah Smith +2 more
wiley +1 more source
Tests for Changes in Count Time Series Models With Exogenous Covariates
ABSTRACT We deal with a parametric change in models for count time series with exogenous covariates specified via the conditional distribution, i.e., with integer generalized autoregressive conditional heteroscedastic models with covariates (INGARCH‐X).
Šárka Hudecová, Marie Hušková
wiley +1 more source
Provably secure private key protection scheme for smart mobile terminal
A provable security scheme for private key protection of smart mobile terminal (SMT) was presented.In the scheme a improved security mechanism is incorporated,which includes password protection,key division and partial key retrieval from server of strong
Jun MA, Jian-feng MA, Yuan-bo GUO
doaj +2 more sources
Certificateless Anonymous Authentication Scheme Supporting Illegal Signatures Localization for Internet of Vehicles [PDF]
In the Internet of Vehicles (IoV) environment, vehicles are connected to public networks through the Internet and information is vulnerable to various malicious attacks from attackers during transmission.
YANG Xiaodong, LI Muzi, MA Guozu, LI Songyu, WANG Caifen
doaj +1 more source
Becoming Dostoevsky (how Rowan Williams opens up Bakhtin)
Abstract With the end of Communism in Russia, non‐materialist contexts were enthusiastically restored to Mikhail Bakhtin's globally famous ideas of carnival, dialogism, and polyphony. This essay surveys Rowan Williams's 2008 study Dostoevsky: Language, Faith + Fiction as a major contribution to this effort, concentrating on those general philosophical ...
Caryl Emerson
wiley +1 more source
The (trans)national Russian religious imagination in exile: Iulia de Beausobre (1893‐1977)
Abstract The article offers a case study of how Russian Orthodox who migrated from the Soviet Union after the Bolshevik Revolution of 1917 reimagined their religious identity and their church in a transnational setting. Iulia de Beausobre (1893‐1977) was a Russian aristocrat who fell victim to the Stalinist purges but survived the Soviet prison system ...
Ruth Coates
wiley +1 more source
On the security of the Courtois-Finiasz-Sendrier signature
We prove that a variant of the Courtois-Finiasz-Sendrier signature is strongly existentially unforgeable under chosen message attack in the random oracle model, assuming hardness of the Permuted Goppa Syndrome Decoding Problem (also known as the ...
Morozov Kirill +3 more
doaj +1 more source

