Results 21 to 30 of about 7,224,636 (326)
A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things
With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things.
Chen Dong +3 more
doaj +1 more source
DECENTRALIZED AUTONOMOUS ORGANIZATIONS
This paper explores the potential of DAOs (Decentralized Autonomous Organizations) built on blockchain technology, which are expected to revolutionize our computing and transaction infrastructures.
Jan-Gero Alexander Hannemann
doaj +1 more source
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset ...
A. Beimel +20 more
core +4 more sources
Virtual Geographic Simulation of Light Distribution within Three-Dimensional Plant Canopy Models
Virtual geographic environments (VGEs) have been regarded as an important new means of simulating, analyzing, and understanding complex geological processes. Plants and light are major components of the geographic environment.
Liyu Tang +5 more
doaj +1 more source
Fake news and COVID-19: modelling the predictors of fake news sharing among social media users
Highlights • Social media, fake news, and COVID-19.• Misinformation on social media has fuelled panic regarding the COVID-19.• Altruism is the strongest predictor of fake news sharing on COVID-19.• Socialization, information seeking and pass time predict
Oberiri Destiny Apuke, Bahiyah Omar
semanticscholar +1 more source
Enforcement and Spectrum Sharing: Case Studies of Federal-Commercial Sharing [PDF]
To promote economic growth and unleash the potential of wireless broadband, there is a need to introduce more spectrally efficient technologies and spectrum management regimes.
Altamimi, Mohammed +2 more
core +1 more source
Secret sharing is a procedure for splitting a message into several parts so that no subset of parts is sufficient to read the message, but the entire set is. We show how this procedure can be implemented using Greenberger-Horne-Zeilinger (GHZ) states. In
M. Hillery, V. Bužek, A. Berthiaume
semanticscholar +1 more source
This study examines the definition of shared leadership and how to measure it. Research so far defines shared leadership as possessing some basic common characteristics. However, the aggregation approach and the social network approach, which have different characteristics, coexist in terms of measurement methods.
Hidenori Sato, Takahiko Makabe
openaire +3 more sources
On-demand high-capacity ride-sharing via dynamic trip-vehicle assignment
Significance Ride-sharing services can provide not only a very personalized mobility experience but also ensure efficiency and sustainability via large-scale ride pooling.
Javier Alonso-Mora +4 more
semanticscholar +1 more source
Fluid model for a network operating under a fair bandwidth-sharing policy
We consider a model of Internet congestion control that represents the randomly varying number of flows present in a network where bandwidth is shared fairly between document transfers.
A Fair +3 more
core +5 more sources

