Results 111 to 120 of about 19,819 (285)

Evaluation of 6‐Month Knowledge Retention and Satisfaction After Pedagogical Escape Games in Dentistry

open access: yesJournal of Dental Education, EarlyView.
ABSTRACT Purpose To evaluate 6‐month knowledge retention and long‐term satisfaction after two pedagogical escape games (PEGs) addressing foundational (3D printing) and clinical (pediatric dentistry) content in a dental curriculum. Methods In this monocentric serial cross‐sectional study, immediate post‑PEG knowledge was assessed in fifth‑year dental ...
Lina Grich   +8 more
wiley   +1 more source

Using Exception Handling to Build Opaque Predicates in Intermediate Code Obfuscation Techniques

open access: yesJournal of Computer Science and Technology, 2008
Microsoft's .NET Framework, and JAVA platforms, are based in a just-in-time compilation philosophy. Software developed using these technologies is executed in a hardware independent framework, which provides a full object-oriented environment, and in ...
Daniel Dolz, Gerardo Parra
doaj  

Preparing for Tomorrow's Teamwork: Insights From eSports on How Human Expertise Shapes Training Needs for AI‐Integrated Work

open access: yesJournal of Organizational Behavior, EarlyView.
ABSTRACT As organizations increasingly adopt human‐AI teams (HATs), understanding how to enhance team performance is paramount. A crucially underexplored area for supporting HATs is training, particularly helping human teammates to work with these inorganic counterparts.
Caitlin M. Lancaster   +5 more
wiley   +1 more source

I Can't Split Myself in Two (or Five): Job Crafting in Highly Demanding and Interdependent Work Environments

open access: yesJournal of Organizational Behavior, EarlyView.
ABSTRACT Employees in highly demanding, interdependent work environments face a dilemma: while avoidance‐focused job crafting can preserve their own well‐being, these self‐initiated changes to their jobs could negatively affect coworkers. Drawing on qualitative interviews with 81 employees concurrently working for multiple agile teams in a European ...
Helene Tenzer   +4 more
wiley   +1 more source

On the Concept of Software Obfuscation in Computer Security

open access: yes, 2007
Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data structures or prevents extracting of some valuable information from the text of a program.
Nikolay Kuzurin   +3 more
openaire   +1 more source

DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping

open access: yes, 2019
VM-based software obfuscation has emerged as an effective technique for program obfuscation. Despite various attempts in improving its effectiveness and security, existing VM-based software obfuscators use potentially multiple but static secret mappings between virtual and native opcodes to hide the underlying instructions. In this paper, we present an
Xiaoyang Cheng   +3 more
openaire   +3 more sources

Beyond Visible Differences: An Experimental Investigation Into the Role of Cognitive Diversity Awareness in Shaping Team Dynamics

open access: yesStrategic Change, EarlyView.
ABSTRACT The relationship between team composition and organizational outcomes is a critical topic in many managerial and business contexts. In this study, we utilize an experimental research method to examine the impact of cognitive diversity on team dynamics.
Jantunen Ari   +5 more
wiley   +1 more source

Nasal Air‐Jet Sensitivity Differentiates Empty Nose Syndrome and Turbinate Reduction Patients: A Pilot Study

open access: yesThe Laryngoscope, EarlyView.
This prospective pilot study aims to compare nasal mucosal sensitivity to air‐jet stimuli between ENS patients and patients who underwent septoplasty/turbinate reduction (septo‐turb) surgery, but without ENS symptoms. The ENS group had a significantly higher (less sensitive) threshold than the septo‐turb group for the septum opposing the center of the ...
Kanghyun Kim   +8 more
wiley   +1 more source

PNNL‐TUNAMELT: Toward automating the detection of interactions with marine energy devices using acoustic camera sensors

open access: yesLimnology and Oceanography: Methods, EarlyView.
Abstract Acoustic cameras, or imaging sonars, are often used to monitor marine energy sites in regions where the water is too dark or turbid for optical sensing. To do so more effectively, scientists are investigating automated detection methodologies to use on these data.
Theodore Nowak   +2 more
wiley   +1 more source

Big Data Discourses| Deceptive Stories About Scale: Digital Technology, Public Services, and the Promise of Efficiency

open access: yesInternational Journal of Communication
“Blitzscaling”—the language and practice of rapidly scaling technology companies—can have significant consequences when pursued in public service delivery.
Alison B. Powell
doaj   +1 more source

Home - About - Disclaimer - Privacy