Results 91 to 100 of about 617,080 (246)

Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing

open access: yesEntropy, 2016
Entropy is a basic and important concept in information theory. It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas.
James (Jong Hyuk) Park, Wanlei Zhou
doaj   +1 more source

How Changing Narratives About the Future Shape Policymaking for the Long Term

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT How can we explain decisions by governments to engage in policy investments—accepting short‐term costs in return for anticipated gains in the longer term—after previously sustaining the status quo? Our article examines the role of narratives in changing expectations about the future as a key driver of intertemporal policymaking. In light of an
Pieter Tuytens, Charlotte Haberstroh
wiley   +1 more source

Access to Archives in Post-Communist Countries: The Victim’s Perspective

open access: yesBaltic Journal of European studies, 2015
The collapse of the communist regime at the end of the twentieth century resulted in a wave of democratization in Central and Eastern Europe. While trying to establish democracy, many states in this region had to demonstrate their ability to protect ...
Gruodytė Edita, Gervienė Silvija
doaj   +1 more source

Study on Damage Characteristics and Evolution Law of Macro‐Meso Structure of Surrounding Rock Under Mining Stress

open access: yesEnergy Science &Engineering, EarlyView.
Investigating the differential impact of mining stress on roadways, we find that in horizontally stressed environments, the inner surrounding rock exhibits more pronounced macro‐meso damage compared to the outer side. ABSTRACT The control of surrounding rocks in dynamic pressure roadways has consistently been one of the challenging predicaments in the ...
Fan Lei   +4 more
wiley   +1 more source

Making care audible: Musical gifts and affective reciprocity in the clinic

open access: yesFeminist Anthropology, EarlyView.
Abstract In clinical settings, music therapy is frequently received as a gift—a voluntary offering that invites but does not demand participation. Drawing on ethnographic research with music therapists and patients in Canadian and American hospitals, this article examines how clinical care is co‐constituted through practices of giving, receiving, and ...
Meredith Evans
wiley   +1 more source

Forecasting Count Data With Varying Dispersion: A Latent‐Variable Approach

open access: yesJournal of Forecasting, EarlyView.
ABSTRACT Count data, such as product sales and disease case counts, are common in business forecasting and many areas of science. Although the Poisson distribution is the best known model for such data, its use is severely limited by its assumption that the dispersion is a fixed function of the mean, which rarely holds in real‐world scenarios.
Easton Huch   +3 more
wiley   +1 more source

Single password authentication method for remote user based on mobile terminal assistance

open access: yesTongxin xuebao, 2019
To address the issue that users frequently reuse their weak passwords in password-based authentication system,single password authentication based on secret sharing between server and mobile terminal (SPASS) was proposed,which allows a remote user to use
Yuan XU, Chao YANG, Li YANG
doaj   +2 more sources

Multifactorial Screening for Fine‐Scale Selection of CCS Industrial Clusters and Hubs in Brazil

open access: yesGreenhouse Gases: Science and Technology, EarlyView.
ABSTRACT As Brazil moves toward implementing its decarbonization commitments, carbon capture and storage (CCS) hubs are emerging as a key pathway for large‐scale CO2 abatement in hard‐to‐abate sectors. This paper presents a multifactorial, data‐driven framework to screen and prioritize potential CCS industrial clusters and hubs across Brazilian regions,
Gustavo P. Oliveira   +5 more
wiley   +1 more source

Citizen Electronic Identities using TPM 2.0

open access: yes, 2014
Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authenticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical security access ...
Asokan, N.   +2 more
core   +1 more source

Developing a Typology of Korean Women Leaders' Resistance to Their Token Status in the Workplace

open access: yesHuman Resource Development Quarterly, EarlyView.
ABSTRACT Despite remarkable economic development in South Korea (Korea), there are only a few women leaders, and they face challenges in the gendered workplace where organizational constraints and traditional values coexist. In a reanalysis of narratives of Korean women leaders (KWLs), using an ideal‐type analysis as a novel qualitative research method,
Yonjoo Cho   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy