Results 21 to 30 of about 5,759,507 (353)
Attendees at 6:30 P.M. Meeting [PDF]
Attendees at 6:30 P.M. Meeting: The President, Secretary of State Rusk, Secretary of Defense Clifford, Secretary of Treasury Fowler, CIA Director Helms, Joint Chief of Staff Chairman Wheeler, and ...
National Security Council (U.S.)
core +1 more source
Computer security and security technologies [PDF]
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information.
Lazar Stošić, Dragan Veličković
openaire +2 more sources
At present, terrorism has become an important factor affecting world peace and development. As the time series data of terrorist attacks usually show a high degree of spatial–temporal correlation, the spatial–temporal prediction of casualties in ...
Zhiwen Hou +3 more
doaj +1 more source
Security-Informed Safety: Supporting Stakeholders with Codes of Practice [PDF]
Codes of practice provide principles and guidance on how organizations can incorporate security considerations into their safety engineering lifecycle and become more security ...
Bishop, P. G. +3 more
core +1 more source
SARS-CoV-2 variants of concern have been associated with reduced vaccine effectiveness, even after a booster dose. In this study, authors aim to estimate vaccine effectiveness against hospitalisation with the Omicron and Delta variants, using different ...
Julia Stowe +4 more
doaj +1 more source
Security in online learning assessment towards an effective trustworthiness approach to support e-learning teams [PDF]
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Caballé Llobet, Santiago +3 more
core +1 more source
Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation
Although numerous spatiotemporal approaches have been presented to address the problem of missing spatiotemporal data, there are still limitations in concurrently capturing the underlying spatiotemporal dependence of spatiotemporal graph data ...
Yifan Wang +6 more
doaj +1 more source
A dynamic graph Hawkes process based on linear complexity self-attention for dynamic recommender systems [PDF]
The dynamic recommender system realizes the real-time recommendation for users by learning the dynamic interest characteristics, which is especially suitable for the scenarios of rapid transfer of user interests, such as e-commerce and social media.
Zhiwen Hou +6 more
doaj +2 more sources
Secure Blocking + Secure Matching = Secure Record Linkage [PDF]
Performing approximate data matching has always been an intriguing problem for both industry and academia. This task becomes even more challenging when the requirement of data privacy rises. In this paper, we propose a novel technique to address the problem of efficient privacy-preserving approximate record linkage.
Alexandros Karakasidis +1 more
openaire +1 more source
Social Security Programs Throughout the World: The Americas, 2011 [PDF]
[Excerpt] This fourth issue in the current four-volume series of Social Security Programs Throughout the World reports on the countries of the Americas.
International Social Security Association +1 more
core +4 more sources

