Results 81 to 90 of about 2,411,901 (357)
Security Aware Mobile Web Service Provisioning [PDF]
Mobile data services in combination with profluent web services are seemingly the path breaking domain in current information research. Effectively, these mobile web services will pave the way for exciting performance and security challenges, the core need-to-be-addressed issues.
arxiv
Secure Transformer Inference Protocol [PDF]
Security of model parameters and user data is critical for Transformer-based services, such as ChatGPT. While recent strides in secure two-party protocols have successfully addressed security concerns in serving Transformer models, their adoption is practically infeasible due to the prohibitive cryptographic overheads involved.
arxiv
Objectives Social determinants of health (SDoH) can impact outcomes but are not routinely screened for in US outpatient rheumatology clinics. This study determined the feasibility of routine point‐of‐care SDoH screening among patients with systemic lupus erythematosus (SLE), and associated barriers and facilitators at the physician, care team, and ...
S. Sam Lim+11 more
wiley +1 more source
Promoting the Readiness of Minors in Supplemental Security Income (PROMISE) [CFDA 84.418P] [PDF]
Over the past two decades, New York State (NYS) has been actively and collaboratively engaged in systems change across three primary domains: 1) to develop a comprehensive employment system to reduce barriers to work and improve employment outcomes of ...
Employment and Disability Institute+2 more
core +1 more source
Secure SQL Server - Enabling Secure Access to Remote Relational Data [PDF]
The Secure SQL Server - SecSS, is a technology primarily developed to enable self-service governance of states, as described in (Paulin 2012). Self-service governance is a novel model of governance that rejects service-based public administration and instead proposes that governed subjects manage their legal relations in a self-service manner, based on
arxiv
Hiding in text/plain sight: Security defences of Tor Onion Services [PDF]
Tor Onion Services are a way to host websites and other internet services anonymously. Onion Services are often used to bypass internet censorship and provide information services to users in oppressive regimes. This paper presents an analysis of the security defences deployed on these Onion Services.
arxiv
Using supramolecular monomers, various hydrogel culture systems were formulated to culture protoplasts; including 2D, 2.5D, and 3D hydrogels. Depending on the culture platform, bioactive functionalization led to protoplast enlargement (2D and 2.5D) or plasmolysis (3D). This work shows the potential to modularly engineer synthetic platforms for cellular
Maritza M. Rovers+3 more
wiley +1 more source
Information-centric networking proposals attract much attention in the ongoing search for a future communication paradigm of the Internet. Replacing the host-to-host connectivity by a data-oriented publish/subscribe service eases content distribution and
Schmidt, Thomas C.+2 more
core +1 more source
Hydrostatic bearings excel in high‐precision applications, but their performance hinges on a continuous external supply. This study evaluates various material combinations for sliding surfaces to mitigate damage during supply failures or misalignment and to discover the most effective materials identified for enhancing the reliability and efficiency of
Michal Michalec+6 more
wiley +1 more source
Paratransit Agency Responses to the Adoption of Sub-contracted Services Using Secure Technologies [PDF]
Transportation agencies across the United States have the responsibility of providing transportation services for all travelers. Paratransit services which are designed to meet the needs of disabled travelers have been available to a certain extent for decades, but under the Americans with Disabilities Act mandate of 1990, uniform requirements were ...
arxiv