Results 51 to 60 of about 22,093 (250)

Staging an Experience of Cultural Heritage Preservation: Consumers' Willingness to Pay for Heirloom Rice in the Philippines

open access: yesAgribusiness, EarlyView.
ABSTRACT The Cordillera Administrative Region in the Philippines is home to terraced rice embedded in centuries of cultural heritage. However, weak market incentives threaten sustained production, jeopardizing indigenous communities' cultural heritage and the in situ biodiversity of rice genetic resources.
Kofi Britwum, Matty Demont
wiley   +1 more source

Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name [PDF]

open access: yes, 2019
An `obfuscation' for encrypted computing is quantified exactly here, leading to an argument that security against polynomial-time attacks has been achieved for user data via the deliberately `chaotic' compilation required for security properties in that ...
Breuer, Peter T.
core   +1 more source

The Role of Actual and Purported Origin in e‐Commerce Wine Pricing: Evidence From Italian and French Names on Labels

open access: yesAgribusiness, EarlyView.
ABSTRACT The origin of a product, if associated with good quality, can contribute to building a positive collective reputation, leading to a potential price premium. However, it is conceivable that a producer markets a product by evoking symbols, images, words, and values typical of places other than where it was designed or produced, creating a ...
Annalisa Caloffi   +2 more
wiley   +1 more source

The Geography of Success: A Spatial Analysis of Export Intensity in the Italian Wine Industry

open access: yesAgribusiness, EarlyView.
ABSTRACT This paper investigates the paradox of how Italy's fragmented, SME‐dominated wine industry achieves global export success. Moving beyond purely firm‐centric explanations, we test whether export intensity is spatially dependent, clustering geographically in regional ecosystems.
Nicolas Depetris Chauvin, Jonas Di Vita
wiley   +1 more source

OntoLogX: Ontology‐Guided Knowledge Graph Extraction From Cybersecurity Logs With Large Language Models

open access: yesAdvanced Intelligent Systems, EarlyView.
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti   +4 more
wiley   +1 more source

Evaluating the African arid corridor hypothesis: A meta‐analysis including the phylogenetic and biogeographical history of Sesamothamnus

open access: yesAmerican Journal of Botany, EarlyView.
Abstract Premise We examined the African arid corridor (AAC) disjunction pattern of vascular plants between northeastern and southwestern Africa in the context of geological and climatic events since the late Miocene. We developed a phylogenetic and biogeographical framework for the arid‐adapted genus Sesamothamnus (Pedaliaceae), a classic example of ...
John G. Zaborsky   +6 more
wiley   +1 more source

Toward Efficient Deobfuscation via Large Language Models

open access: yesIEEE Access
Obfuscation modifies code structure to impede reverse engineering and is widely used to protect intellectual property and evade malware detection. However, existing deobfuscation techniques largely rely on analyst-driven heuristics or are tailored to ...
Byunggeon Choi   +3 more
doaj   +1 more source

Source code obfuscation with genetic algorithms using LLVM code optimizations

open access: yesLogic Journal of the IGPL
Abstract With the advent of the cloud computing model allowing a shared access to massive computing facilities, a surging demand emerges for the protection of the intellectual property tied to the programs executed on these uncontrolled systems.
Torre Macías, Juan Carlos de la   +4 more
openaire   +3 more sources

Border harm and affective injustice: The politics of anger at the Melilla border, Spain

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract This article examines protests in a detention center in Melilla, Spain—a site where structural violence intersects with the everyday harms of confinement. Adopting a justice and dignity‐centered perspective, we analyze grassroots forms of resistance emerging at the border. The study focuses on the protests of Tunisian migrants and explores the
Corina Tulbure
wiley   +1 more source

Metamorphic Code Generation from LLVM IR Bytecode [PDF]

open access: yes, 2013
Metamorphic software changes its internal structure across generations with its functionality remaining unchanged. Metamorphism has been employed by malware writers as a means of evading signature detection and other advanced detection strate- gies ...
Sjsu Scholarworks   +4 more
core   +3 more sources

Home - About - Disclaimer - Privacy