Results 1 to 10 of about 11,572 (115)
Telling “white lies” within the entrepreneurial firm: How rationalized knowledge hiding between founder CEO and founder CTO influences new product development [PDF]
Most knowledge hiding studies focus on its dark side. In contrast, we theorize the potential positive effect of rationalized knowledge hiding in the context of entrepreneurial firms’ new product development (NPD) speed. We extended and integrated theoretical perspectives of rationalized knowledge hiding and trust in theorizing that rationalized ...
Xiong, Chang +4 more
openaire +1 more source
Data hiding in audio signal using Rational Dither Modulation
A data hiding system in audio signals based on a Rational Dither Modulation is proposed, which hides information in the Modulated Complex Lapped Transform (MCLT) domain. The proposed system is able to hide around of 689bits per second, while keeping a CD-quality audio signal. Objective and subjective evaluations show robustness to classical attacks and
Jose Juan Garcia-Hernandez +2 more
openaire +2 more sources
The willingness to share depends on different motifs – even envy. Examples from Pakistan, Latin America and the USA. Photo credits: The pictures were taken by Cherry Lindholm, who accompanied Charles Lindholm on his field trip to Swat Valley in ...
Lindholm, Charles
core +4 more sources
What I make up when I wake up: anti-experience views and narrative fabrication of dreams [PDF]
I propose a narrative fabrication thesis of dream reports, according to which dream reports are often not accurate representations of experiences that occur during sleep.
Rosen, Melanie
core +1 more source
Topos And Entelechy In The Ethos Of Reclusion In China [PDF]
While the topos of reclusion was ubiquitous in the scholar-official culture of traditional China, there was already in medieval sources a discernible differentiation between essentiality and semblance, between bona fide men in reclusion and men who took ...
Berkowitz, Alan
core +3 more sources
Now a day’s information security is most wanted achievement, and its need in the communication. The intends of this entitle work is wished-for an image encryption and decryption. Image encryption is an effective approach for providing security and privacy protection for medical images.
G. Thippanna, T. Bhaskara Reddy
openaire +1 more source
Small Things like Reasons are Put in a Jar: Reason and Legitimacy in the Administrative State [PDF]
Why is a multi-purpose word. It is the language of curiosity, evidence of intellectual engagement. We revel in our children\u27s and our students\u27 whys; reward their curiosity with attention and serious responses; turn their whys back on them- why do
Mashaw, Jeffrey L.
core +3 more sources
The Microphysics of Deportation A Critical Reading of Return Flight Monitoring Reports [PDF]
In the paper, I argue there is a whole political logistics to deportation. This is made visible by bringing the concept of microphysics to bear on the topic.
Walters, William
core +1 more source
Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds
Adversarial attack methods based on point manipulation for 3D point cloud classification have revealed the fragility of 3D models, yet the adversarial examples they produce are easily perceived or defended against. The trade-off between the imperceptibility and adversarial strength leads most point attack methods to inevitably introduce easily ...
Lou, Tianrui +6 more
openaire +2 more sources
The ant Plagiolepis pallescens Forel, 1889 (Hymenoptera: Formicidae), common to the Middle East (Martinez & Amar 2014; Pashaei Rad et al. 2018), was found to build walls around food items that they were not hoarding, suggesting a concealment behavior.
openaire +1 more source

