Results 21 to 30 of about 7,224,636 (326)

A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things

open access: yesInternational Journal of Distributed Sensor Networks, 2019
With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things.
Chen Dong   +3 more
doaj   +1 more source

DECENTRALIZED AUTONOMOUS ORGANIZATIONS

open access: yesInternational Journal of Law in Changing World, 2023
This paper explores the potential of DAOs (Decentralized Autonomous Organizations) built on blockchain technology, which are expected to revolutionize our computing and transaction infrastructures.
Jan-Gero Alexander Hannemann
doaj   +1 more source

Secret-Sharing for NP [PDF]

open access: yes, 2014
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset ...
A. Beimel   +20 more
core   +4 more sources

Virtual Geographic Simulation of Light Distribution within Three-Dimensional Plant Canopy Models

open access: yesISPRS International Journal of Geo-Information, 2017
Virtual geographic environments (VGEs) have been regarded as an important new means of simulating, analyzing, and understanding complex geological processes. Plants and light are major components of the geographic environment.
Liyu Tang   +5 more
doaj   +1 more source

Fake news and COVID-19: modelling the predictors of fake news sharing among social media users

open access: yesTelematics and informatics, 2020
Highlights • Social media, fake news, and COVID-19.• Misinformation on social media has fuelled panic regarding the COVID-19.• Altruism is the strongest predictor of fake news sharing on COVID-19.• Socialization, information seeking and pass time predict
Oberiri Destiny Apuke, Bahiyah Omar
semanticscholar   +1 more source

Enforcement and Spectrum Sharing: Case Studies of Federal-Commercial Sharing [PDF]

open access: yes, 2013
To promote economic growth and unleash the potential of wireless broadband, there is a need to introduce more spectrally efficient technologies and spectrum management regimes.
Altamimi, Mohammed   +2 more
core   +1 more source

Quantum secret sharing [PDF]

open access: yes, 1998
Secret sharing is a procedure for splitting a message into several parts so that no subset of parts is sufficient to read the message, but the entire set is. We show how this procedure can be implemented using Greenberger-Horne-Zeilinger (GHZ) states. In
M. Hillery, V. Bužek, A. Berthiaume
semanticscholar   +1 more source

Is shared leadership shared?

open access: yesAnnals of Business Administrative Science, 2021
This study examines the definition of shared leadership and how to measure it. Research so far defines shared leadership as possessing some basic common characteristics. However, the aggregation approach and the social network approach, which have different characteristics, coexist in terms of measurement methods.
Hidenori Sato, Takahiko Makabe
openaire   +3 more sources

On-demand high-capacity ride-sharing via dynamic trip-vehicle assignment

open access: yesProceedings of the National Academy of Sciences of the United States of America, 2017
Significance Ride-sharing services can provide not only a very personalized mobility experience but also ensure efficiency and sustainability via large-scale ride pooling.
Javier Alonso-Mora   +4 more
semanticscholar   +1 more source

Fluid model for a network operating under a fair bandwidth-sharing policy

open access: yes, 2004
We consider a model of Internet congestion control that represents the randomly varying number of flows present in a network where bandwidth is shared fairly between document transfers.
A Fair   +3 more
core   +5 more sources

Home - About - Disclaimer - Privacy