Results 11 to 20 of about 5,525,844 (353)
Vaccine effectiveness of a ChAdOx1-S booster was estimated in a test-negative case-control study in England. Protection was found to be moderate against mild disease but remained high and comparable to that of an mRNA booster against hospitalisation with
Freja Cordelia Møller Kirsebom +5 more
doaj +1 more source
Attendees at 6:30 P.M. Meeting [PDF]
Attendees at 6:30 P.M. Meeting: The President, Secretary of State Rusk, Secretary of Defense Clifford, Secretary of Treasury Fowler, CIA Director Helms, Joint Chief of Staff Chairman Wheeler, and ...
National Security Council (U.S.)
core +1 more source
At present, terrorism has become an important factor affecting world peace and development. As the time series data of terrorist attacks usually show a high degree of spatial–temporal correlation, the spatial–temporal prediction of casualties in ...
Zhiwen Hou +3 more
doaj +1 more source
A dynamic graph Hawkes process based on linear complexity self-attention for dynamic recommender systems [PDF]
The dynamic recommender system realizes the real-time recommendation for users by learning the dynamic interest characteristics, which is especially suitable for the scenarios of rapid transfer of user interests, such as e-commerce and social media.
Zhiwen Hou +6 more
doaj +2 more sources
Statistical Security for Social Security [PDF]
Abstract The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration’s (SSA’s) forecasting procedures, which until now has been ...
Soneji, Samir, King, Gary
openaire +4 more sources
Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by an attacker. Consequently, secure programming guidelines for Java stress the importance of using defensive copying before accepting or handing out references to an internal mutable object.
Jensen, Thomas +2 more
openaire +6 more sources
Security-Informed Safety: Supporting Stakeholders with Codes of Practice [PDF]
Codes of practice provide principles and guidance on how organizations can incorporate security considerations into their safety engineering lifecycle and become more security ...
Bishop, P. G. +3 more
core +1 more source
SARS-CoV-2 variants of concern have been associated with reduced vaccine effectiveness, even after a booster dose. In this study, authors aim to estimate vaccine effectiveness against hospitalisation with the Omicron and Delta variants, using different ...
Julia Stowe +4 more
doaj +1 more source
Security in online learning assessment towards an effective trustworthiness approach to support e-learning teams [PDF]
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Caballé Llobet, Santiago +3 more
core +1 more source
Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation
Although numerous spatiotemporal approaches have been presented to address the problem of missing spatiotemporal data, there are still limitations in concurrently capturing the underlying spatiotemporal dependence of spatiotemporal graph data ...
Yifan Wang +6 more
doaj +1 more source

