Results 41 to 50 of about 2,344,167 (352)
Повышение точности IP-геолокации на основе данных, предоставляемых открытыми IP-геосервисами
IP-геолокация – это процесс определения реального географического положения электронного устройства, подключенного к сети Интернет, по его глобальному сетевому адресу [1].
Maxim Ivanov, Alexander Polunin
doaj +1 more source
Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems [PDF]
Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679) and security assurance are currently two major challenges of Cloud-based systems.
Dominiak, Jacek +8 more
core +2 more sources
Secure OM2M Service Platform [PDF]
Machine-to-Machine (M2M) paradigm is one of the main concern of Internet of Things (IoT). Its scope is to interconnect billions of heterogeneous devices able to interact in various application domains. Since M2M suffers from a high vertical fragmentation of current M2M markets and lacks of standards, the European Telecommunications Standards Institute (
Sicari, Sabrina +4 more
openaire +2 more sources
Zaangażowanie, unikanie, odmowa współpracy. Marian Jurczyk wobec Służby Bezpieczeństwa (1977–1980) [PDF]
This article discusses the rela tionship of one of the later leaders of the „Solidarity” Trade Union, Marian Jurczyk, with the Security Service, during the 1970s.
Michał Siedziako
doaj +1 more source
Pendulummanagement in secure services [PDF]
Tilt ([2003][1]) defends himself clearly against the criticisms of Drs Exworthy & Gunn ([2003][2]). However, he does not emphasise the extent to which they have misrepresented aspects of the Tilt Report ([Tilt et al , 2000][3]).
openaire +2 more sources
ABSTRACT This article explores how artificial intelligence (AI) can support online adult learning by aligning with Knowles’ four principles of andragogy: involvement, experience, problem‐centeredness, and relevance. Three activities were analyzed using a comparative case study (CCS) method.
Xi Lin, Steve W. Schmidt
wiley +1 more source
Protecting web services with service oriented traceback architecture [PDF]
Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions.
Chonka, Ashley +2 more
core +2 more sources
ABSTRACT This article explores institutional policies on artificial intelligence (AI) in higher education. As AI tools become increasingly utilized in academia—from research and teaching to assessment and student support—institutions face growing pressure to establish clear, ethical, and practical guidelines to help guide faculty.
Lauren Azevedo +3 more
wiley +1 more source
Legislative Alert: Rokita Amendment [PDF]
[Excerpt] The AFL-CIO urges you to oppose the Rokita Amendment to the Homeland Security bill that would deny basic collective bargaining rights to Transportation Security Officers (TSOs). The Rokita Amendment would single out TSOs from among the hundreds
Samuel, William
core +1 more source
Characteristics of Cerebral Palsy in the Midwestern US
ABSTRACT Objective Cerebral palsy (CP) is the most common lifelong motor disability worldwide. Yet, data is limited on how CP manifests in the US. Our objective was to characterize and determine factors affecting functional outcomes in a large population of young people with CP in the Midwestern US.
Susie Kim +6 more
wiley +1 more source

