Results 91 to 100 of about 7,184,030 (395)
5G wireless P2MP backhaul security protocol: an adaptive approach
5G has introduced various emerging demands for new services and technologies that raised the bar for quality of service, latency, handovers, and data rates.
Jiyoon Kim+4 more
doaj +1 more source
Family Security Insurance: A New Foundation for Economic Security [PDF]
A report released by Georgetown Law\u27s Workplace Flexibility 2010 and the Berkeley Center on Health, Economic & Family Security (Berkeley CHEFS) outlining a blueprint for establishing and financing a new national insurance program to provide wage ...
Berkeley Center on Health, Economic & Family Security, UC Berkeley School of Law+1 more
core +1 more source
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health. Methods We conducted a search for keywords which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the list of
Joy Buie+11 more
wiley +1 more source
Facilitating Effective Food Security Policy Reform [PDF]
Food Security and Poverty, Downloads December 2008 - July 2009: 10,
Food Security II Faculty
core +1 more source
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy+9 more
wiley +1 more source
Cryptanalysis on Two Kinds of Number Theoretic Pseudo-Random Generators Using Coppersmith Method
Pseudo-random number generator (PRNG) is a type of algorithm that generates a sequence of random numbers using a mathematical formula, which is widely used in computer science, such as simulation, modeling applications, data encryption, et cetera.
Ran Zhang+3 more
doaj +1 more source
Background In the view of endemic avian influenza H9N2 infection in poultry, its zoonotic potential and emergence of antiviral resistance, two herbal plants, Ocimum sanctum and Acacia arabica, which are easily available throughout various geographical ...
S. S. Ghoke+11 more
doaj +1 more source
Influence Maximization with Priority in Online Social Networks
The Influence Maximization (IM) problem, which finds a set of k nodes (called seedset) in a social network to initiate the influence spread so that the number of influenced nodes after propagation process is maximized, is an important problem in ...
Canh V. Pham+4 more
doaj +1 more source
The Australian Cyber Security Centre threat report 2015 [PDF]
Introduction: The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for
Australian Cyber Security Centre
core
Arguing security: validating security requirements using structured argumentation [PDF]
This paper proposes using both formal and structured informal arguments to show that an eventual realized system can satisfy its security requirements. These arguments, called 'satisfaction arguments', consist of two parts: a formal argument based upon ...
Haley, Charles B.+3 more
core +2 more sources