Results 111 to 120 of about 19,819 (285)
ABSTRACT Purpose To evaluate 6‐month knowledge retention and long‐term satisfaction after two pedagogical escape games (PEGs) addressing foundational (3D printing) and clinical (pediatric dentistry) content in a dental curriculum. Methods In this monocentric serial cross‐sectional study, immediate post‑PEG knowledge was assessed in fifth‑year dental ...
Lina Grich +8 more
wiley +1 more source
Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj
ABSTRACT As organizations increasingly adopt human‐AI teams (HATs), understanding how to enhance team performance is paramount. A crucially underexplored area for supporting HATs is training, particularly helping human teammates to work with these inorganic counterparts.
Caitlin M. Lancaster +5 more
wiley +1 more source
ABSTRACT Employees in highly demanding, interdependent work environments face a dilemma: while avoidance‐focused job crafting can preserve their own well‐being, these self‐initiated changes to their jobs could negatively affect coworkers. Drawing on qualitative interviews with 81 employees concurrently working for multiple agile teams in a European ...
Helene Tenzer +4 more
wiley +1 more source
On the Concept of Software Obfuscation in Computer Security
Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program.
Nikolay Kuzurin +3 more
openaire +1 more source
DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping
VM-based software obfuscation has emerged as an effective technique for program obfuscation. Despite various attempts in improving its effectiveness and security, existing VM-based software obfuscators use potentially multiple but static secret mappings between virtual and native opcodes to hide the underlying instructions. In this paper, we present an
Xiaoyang Cheng +3 more
openaire +3 more sources
ABSTRACT The relationship between team composition and organizational outcomes is a critical topic in many managerial and business contexts. In this study, we utilize an experimental research method to examine the impact of cognitive diversity on team dynamics.
Jantunen Ari +5 more
wiley +1 more source
This prospective pilot study aims to compare nasal mucosal sensitivity to air‐jet stimuli between ENS patients and patients who underwent septoplasty/turbinate reduction (septo‐turb) surgery, but without ENS symptoms. The ENS group had a significantly higher (less sensitive) threshold than the septo‐turb group for the septum opposing the center of the ...
Kanghyun Kim +8 more
wiley +1 more source
Abstract Acoustic cameras, or imaging sonars, are often used to monitor marine energy sites in regions where the water is too dark or turbid for optical sensing. To do so more effectively, scientists are investigating automated detection methodologies to use on these data.
Theodore Nowak +2 more
wiley +1 more source
“Blitzscaling”—the language and practice of rapidly scaling technology companies—can have significant consequences when pursued in public service delivery.
Alison B. Powell
doaj +1 more source

