Results 21 to 30 of about 4,580,925 (281)

A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things

open access: yesInternational Journal of Distributed Sensor Networks, 2019
With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things.
Chen Dong   +3 more
doaj   +1 more source

Is shared leadership shared?

open access: yesAnnals of Business Administrative Science, 2021
This study examines the definition of shared leadership and how to measure it. Research so far defines shared leadership as possessing some basic common characteristics. However, the aggregation approach and the social network approach, which have different characteristics, coexist in terms of measurement methods.
Hidenori Sato, Takahiko Makabe
openaire   +3 more sources

Fluid model for a network operating under a fair bandwidth-sharing policy

open access: yes, 2004
We consider a model of Internet congestion control that represents the randomly varying number of flows present in a network where bandwidth is shared fairly between document transfers.
A Fair   +3 more
core   +5 more sources

Impact of removing OPTN region from vascularized composite allograft allocation

open access: yesFrontiers in Transplantation
On 6/18/2020, the Organ Procurement and Transplantation Network (OPTN) implemented new policy replacing OPTN region with a 500 nautical mile (NM) circle around the donor hospital for the purpose of vascularized composite allograft (VCA) allocation.
Sarah E. Booker   +7 more
doaj   +1 more source

Application of trehalose ameliorates heat stress and promotes recovery of winter wheat seedlings

open access: yesBiologia Plantarum, 2014
Trehalose was supplied to wheat (Triticum aestivum L.) seedlings just before a high temperature (40 °C) treatment and some physiological parameters were measured during the heat stress and recovery.
Y. Luo, Y. M. Gao, W. Wang, C. J. Zou
doaj   +1 more source

Hardware Trojans in Chips: A Survey for Detection and Prevention

open access: yesSensors, 2020
Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs.
Chen Dong   +5 more
doaj   +1 more source

Vascularized composite allograft deceased donation in the United States

open access: yesFrontiers in Transplantation
Vascularized composite allograft (VCA) transplantation represents a significant advancement in reconstructive surgery and offers hope to individuals who experienced congenital disorders or severe tissue injuries to restore physical appearance, function ...
Wida S. Cherikh   +7 more
doaj   +1 more source

Secret-Sharing for NP [PDF]

open access: yes, 2014
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any "unqualified" subset ...
A. Beimel   +20 more
core   +4 more sources

Modernizing the Design Process for US Organ Allocation Policy: Toward a Continuous Distribution Policy for Kidneys

open access: yesTransplantation Direct
Background. The allocation of a limited supply of donor organs remains a critical challenge for organ transplantation. The analytical tools that policymakers rely upon for improving allocation policy have seen little advancement since the introduction of
Elijah Pivo, PhD(c)   +8 more
doaj   +1 more source

SCMDOT: Spatial Clustering with Multiple Density-Ordered Trees

open access: yesISPRS International Journal of Geo-Information, 2017
With the rapid explosion of information based on location, spatial clustering plays an increasingly significant role in this day and age as an important technique in geographical data analysis.
Xiaozhu Wu, Hong Jiang, Chongcheng Chen
doaj   +1 more source

Home - About - Disclaimer - Privacy