Results 21 to 30 of about 265,801 (283)
In the past few years numerous secret transgressions and crimes have been revealed in the media. Whistleblowers reveal clandestine agreements between managers and directors of large companies; criminals (pentiti) make deals with criminal justice ...
Dina Siegel
doaj +1 more source
In "History on the Run: Secrecy, Fugitivity, and Hmong Refugee Epistemologies," Ma Vang deftly answers the question of how one can “recount a history that has systematically been kept secret” by centering Hmong refugees as sources of knowledge and ...
Aline Lo
doaj +1 more source
Mode selection, caching and physical layer security for fog networks [PDF]
Fog networks facilitate ultra-low latency through the use of data availability near the network edge in fog servers. Existing work in fog networks considers the objective of energy efficiency and low latency for internet-of-things (IoT) for resource ...
Rabeea Basir +4 more
doaj +1 more source
Source-Channel Secrecy with Causal Disclosure [PDF]
Imperfect secrecy in communication systems is investigated. Instead of using equivocation as a measure of secrecy, the distortion that an eavesdropper incurs in producing an estimate of the source sequence is examined.
Cuff, Paul +3 more
core +1 more source
The Bureau and the Realism of Spy Fiction
This article addresses the issue of realism in relationship to contemporary serial fiction. Drawing on The Bureau (Canal+, 2015–2020), it argues that spy TV series are “realistic” not because they correspond to reality but because of their impact on ...
Blistène Pauline
doaj +1 more source
Multipartite Classical and Quantum Secrecy Monotones [PDF]
In order to study multipartite quantum cryptography, we introduce quantities which vanish on product probability distributions, and which can only decrease if the parties carry out local operations or carry out public classical communication.
A. Wehrl +22 more
core +2 more sources
Maximal Correlation Secrecy [PDF]
15 pages, 2 figure, presented in part at IEEE International Symposium on Information Theory ...
Cheuk Ting Li, Abbas El Gamal
openaire +2 more sources
Knowledge Bases and Representation Learning Towards Bug Triaging
A large number of bug reports are submitted by users and developers in bug-tracking system every day. It is time-consuming for software maintainers to assign bug reports to appropriate developers for fixing manually.
Qi Wang +6 more
doaj +1 more source
Research objective: This chapter helps researchers who want their academic writing to include explicit accounts of the ways in which they navigated secrecy and its ethical dilemmas in their fieldwork. It proposes that one way of including such accounts is by way of ‘secrecy vignettes’.
openaire +3 more sources
Hiv-positive women migrating from sub-Saharan Africa combine vulnerabilities. Based on qualitative research carried out among 30 hiv-positive women, this article proposes to analyse how they integrate themselves into various social spheres (familial ...
Francesca Poglia Mileti +4 more
doaj +1 more source

