Results 101 to 110 of about 1,030,766 (332)

Analysis of correlation rules in Security information and event management systems

open access: yesCOMPUTER AND INFORMATION SYSTEMS AND TECHNOLOGIES, 2020
This article discusses the main components of information security systems and information security incident management. The methods of non-signature, as well as signature analysis of rules and decision-making that are used in such systems are considered. The analysis of existing methods of correlation rules.
Sievierinov, Oleksandr   +1 more
openaire   +3 more sources

All‐in‐One Analog AI Hardware: On‐Chip Training and Inference with Conductive‐Metal‐Oxide/HfOx ReRAM Devices

open access: yesAdvanced Functional Materials, EarlyView.
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone   +11 more
wiley   +1 more source

Composition and Resulting Band Alignment at the TiO2/InP Heterointerface: A Fundamental Study Combining Photoemission Spectroscopy and Theory

open access: yesAdvanced Functional Materials, EarlyView.
The chemical composition and band alignment are systematically investigated at the TiO2/InP heterointerface. Thin TiO2 films are deposited by ALD on atomically ordered, P‐terminated p‐InP(100). By combining UPS, XPS, and ab initio molecular dynamics, the atomistic structure and electronic alignment are revealed.
Mohammad Amin Zare Pour   +11 more
wiley   +1 more source

Photoswitching Conduction in Framework Materials

open access: yesAdvanced Functional Materials, EarlyView.
This mini‐review summarizes recent advances in state‐of‐the‐art proton and electron conduction in framework materials that can be remotely and reversibly switched on and off by light. It discusses the various photoswitching conduction mechanisms and the strategies employed to enhance photoswitched conductivity.
Helmy Pacheco Hernandez   +4 more
wiley   +1 more source

A Bespoke Programmable Interpenetrating Elastomer Network Composite Laryngeal Stent for Expedited Paediatric Laryngotracheal Reconstruction

open access: yesAdvanced Functional Materials, EarlyView.
A programmable interpenetrating double‐network architecture, created via 3D‐TIPS printing and resin infusion, synergistically combines thermoplastic and thermosetting elastomers to balance structural rigidity and surface softness—crucial for paediatric laryngeal stents.
Elizabeth F. Maughan   +14 more
wiley   +1 more source

Preserving Electronically Encoded Evidence [PDF]

open access: yes, 2009
Seeking to preserve electronically encoded evidence implies that an incident or event has occurred requiring fact extrapolation for presentation, as proof of an irregularity or illegal act.
Robert, E. Davis
core  

Functional Materials for Environmental Energy Harvesting in Smart Agriculture via Triboelectric Nanogenerators

open access: yesAdvanced Functional Materials, EarlyView.
This review explores functional and responsive materials for triboelectric nanogenerators (TENGs) in sustainable smart agriculture. It examines how particulate contamination and dirt affect charge transfer and efficiency. Environmental challenges and strategies to enhance durability and responsiveness are outlined, including active functional layers ...
Rafael R. A. Silva   +9 more
wiley   +1 more source

European Union Pension Directive [PDF]

open access: yes, 2003
[Excerpt] This Directive thus represents a first step on the way to an internal market for occupational retirement provision organised on a European scale. By setting the ‘prudent person’ rule as the underlying principle for capital investment and making
The European Parliament and the Council of the European Union
core   +1 more source

BUDAMAF: Data Management in Cloud Federations

open access: yes, 2018
Data management has always been a multi-domain problem even in the simplest cases. It involves, quality of service, security, resource management, cost management, incident identification, disaster avoidance and/or recovery, as well as many other ...
Anagnostopoulos, Dimosthenis   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy