Results 11 to 20 of about 5,525,844 (353)

Effectiveness of ChAdOx1-S COVID-19 booster vaccination against the Omicron and Delta variants in England

open access: yesNature Communications, 2022
Vaccine effectiveness of a ChAdOx1-S booster was estimated in a test-negative case-control study in England. Protection was found to be moderate against mild disease but remained high and comparable to that of an mRNA booster against hospitalisation with
Freja Cordelia Møller Kirsebom   +5 more
doaj   +1 more source

Attendees at 6:30 P.M. Meeting [PDF]

open access: yes, 1968
Attendees at 6:30 P.M. Meeting: The President, Secretary of State Rusk, Secretary of Defense Clifford, Secretary of Treasury Fowler, CIA Director Helms, Joint Chief of Staff Chairman Wheeler, and ...
National Security Council (U.S.)
core   +1 more source

Attention-based spatial–temporal multi-graph convolutional networks for casualty prediction of terrorist attacks

open access: yesComplex & Intelligent Systems, 2023
At present, terrorism has become an important factor affecting world peace and development. As the time series data of terrorist attacks usually show a high degree of spatial–temporal correlation, the spatial–temporal prediction of casualties in ...
Zhiwen Hou   +3 more
doaj   +1 more source

A dynamic graph Hawkes process based on linear complexity self-attention for dynamic recommender systems [PDF]

open access: yesPeerJ Computer Science, 2023
The dynamic recommender system realizes the real-time recommendation for users by learning the dynamic interest characteristics, which is especially suitable for the scenarios of rapid transfer of user interests, such as e-commerce and social media.
Zhiwen Hou   +6 more
doaj   +2 more sources

Statistical Security for Social Security [PDF]

open access: yesDemography, 2012
Abstract The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration’s (SSA’s) forecasting procedures, which until now has been ...
Soneji, Samir, King, Gary
openaire   +4 more sources

Secure the Clones [PDF]

open access: yesLogical Methods in Computer Science, 2012
Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by an attacker. Consequently, secure programming guidelines for Java stress the importance of using defensive copying before accepting or handing out references to an internal mutable object.
Jensen, Thomas   +2 more
openaire   +6 more sources

Security-Informed Safety: Supporting Stakeholders with Codes of Practice [PDF]

open access: yes, 2018
Codes of practice provide principles and guidance on how organizations can incorporate security considerations into their safety engineering lifecycle and become more security ...
Bishop, P. G.   +3 more
core   +1 more source

Effectiveness of COVID-19 vaccines against Omicron and Delta hospitalisation, a test negative case-control study

open access: yesNature Communications, 2022
SARS-CoV-2 variants of concern have been associated with reduced vaccine effectiveness, even after a booster dose. In this study, authors aim to estimate vaccine effectiveness against hospitalisation with the Omicron and Delta variants, using different ...
Julia Stowe   +4 more
doaj   +1 more source

Security in online learning assessment towards an effective trustworthiness approach to support e-learning teams [PDF]

open access: yes, 2014
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Caballé Llobet, Santiago   +3 more
core   +1 more source

Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation

open access: yesScientific Reports, 2023
Although numerous spatiotemporal approaches have been presented to address the problem of missing spatiotemporal data, there are still limitations in concurrently capturing the underlying spatiotemporal dependence of spatiotemporal graph data ...
Yifan Wang   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy