Results 91 to 100 of about 46,179 (288)
Semantic Query Reformulation in Social PDMS [PDF]
We consider social peer-to-peer data management systems (PDMS), where each peer maintains both semantic mappings between its schema and some acquaintances, and social links with peer friends.
Angela Bonifati +4 more
core +1 more source
ABSTRACT Bullying perpetration and substance use are two prevalent and concerning forms of delinquent behavior worldwide. Although parent–child communication has been theorized to reduce adolescents' involvement in these behaviors, empirical evidence remains mixed.
Hang Zhou, Ji‐Kang Chen
wiley +1 more source
ABSTRACT Previous research on the mediating role of the quality of social relationships between material deprivation and adolescent health has predominantly utilized samples from mainstream populations to examine mental health outcomes, neglecting the critical need to explore behavioral health outcomes, such as substance use, particularly in ...
Zewei Liu, Ji‐Kang Chen
wiley +1 more source
This study investigates the blast‐induced rock damage patterns under different cut‐hole layouts and ground stress conditions through numerical simulations and field tests. The findings in this study provide valuable insights for similar underground engineering applications.
Junjie Zhao +5 more
wiley +1 more source
Data Leak Detection As a Service: Challenges and Solutions [PDF]
We describe a network-based data-leak detection (DLD) technique, the main feature of which is that the detection does not require the data owner to reveal the content of the sensitive data.
Shu, Xiaokui, Yao, Danfeng (Daphne)
core +1 more source
The tensile strength of granite, a proposed host for nuclear waste, degrades severely above 400°C. We link this to specific microcracking patterns captured by acoustic emission, establishing a scientific basis for assessing repository safety under thermal load.
Wei Zeng +7 more
wiley +1 more source
This study reports a mild “Zn(NO3)2 interlayer‐expansion” strategy combined with electrodeposition to produce a self‐supporting capacitive anode (NiFe@PC) that preserves the wood's native low‐tortuosity channels. The retained native architecture expands niches for microbial colonization.
Xue Liu +10 more
wiley +1 more source
Hash-Tree Anti-Tampering Schemes [PDF]
Procedures that provide detection, location and correction of tampering in documents are known as anti-tampering schemes. In this paper we describe how to construct an anti-tampering scheme using a pre-computed tree of hashes.
Ashman, Helen, Moss, Ben
core
By combining electronic structure modulation and hierarchical channel construction, a wood‐derived Cr‐Co2P@PNC/PCW electrocatalyst is developed. This multicomponent synergistic modulation strategy significantly improves the efficiency of OER. Designing synergistic regulation strategies is widely recognized as an effective approach to enhancing ...
Zihan Zhang +8 more
wiley +1 more source
Abstract Aims Natriuretic peptide‐based pre‐heart failure screening has been proposed in recent guidelines. However, an effective strategy to identify screening targets from the general population, more than half of which are at risk for heart failure or pre‐heart failure, has not been well established.
Yuichiro Mori +5 more
wiley +1 more source

