Results 51 to 60 of about 22,093 (250)
ABSTRACT The Cordillera Administrative Region in the Philippines is home to terraced rice embedded in centuries of cultural heritage. However, weak market incentives threaten sustained production, jeopardizing indigenous communities' cultural heritage and the in situ biodiversity of rice genetic resources.
Kofi Britwum, Matty Demont
wiley +1 more source
Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name [PDF]
An `obfuscation' for encrypted computing is quantified exactly here, leading to an argument that security against polynomial-time attacks has been achieved for user data via the deliberately `chaotic' compilation required for security properties in that ...
Breuer, Peter T.
core +1 more source
ABSTRACT The origin of a product, if associated with good quality, can contribute to building a positive collective reputation, leading to a potential price premium. However, it is conceivable that a producer markets a product by evoking symbols, images, words, and values typical of places other than where it was designed or produced, creating a ...
Annalisa Caloffi +2 more
wiley +1 more source
The Geography of Success: A Spatial Analysis of Export Intensity in the Italian Wine Industry
ABSTRACT This paper investigates the paradox of how Italy's fragmented, SME‐dominated wine industry achieves global export success. Moving beyond purely firm‐centric explanations, we test whether export intensity is spatially dependent, clustering geographically in regional ecosystems.
Nicolas Depetris Chauvin, Jonas Di Vita
wiley +1 more source
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti +4 more
wiley +1 more source
Abstract Premise We examined the African arid corridor (AAC) disjunction pattern of vascular plants between northeastern and southwestern Africa in the context of geological and climatic events since the late Miocene. We developed a phylogenetic and biogeographical framework for the arid‐adapted genus Sesamothamnus (Pedaliaceae), a classic example of ...
John G. Zaborsky +6 more
wiley +1 more source
Toward Efficient Deobfuscation via Large Language Models
Obfuscation modifies code structure to impede reverse engineering and is widely used to protect intellectual property and evade malware detection. However, existing deobfuscation techniques largely rely on analyst-driven heuristics or are tailored to ...
Byunggeon Choi +3 more
doaj +1 more source
Source code obfuscation with genetic algorithms using LLVM code optimizations
Abstract With the advent of the cloud computing model allowing a shared access to massive computing facilities, a surging demand emerges for the protection of the intellectual property tied to the programs executed on these uncontrolled systems.
Torre Macías, Juan Carlos de la +4 more
openaire +3 more sources
Border harm and affective injustice: The politics of anger at the Melilla border, Spain
Abstract This article examines protests in a detention center in Melilla, Spain—a site where structural violence intersects with the everyday harms of confinement. Adopting a justice and dignity‐centered perspective, we analyze grassroots forms of resistance emerging at the border. The study focuses on the protests of Tunisian migrants and explores the
Corina Tulbure
wiley +1 more source
Metamorphic Code Generation from LLVM IR Bytecode [PDF]
Metamorphic software changes its internal structure across generations with its functionality remaining unchanged. Metamorphism has been employed by malware writers as a means of evading signature detection and other advanced detection strate- gies ...
Sjsu Scholarworks +4 more
core +3 more sources

