Results 121 to 130 of about 350,756 (314)

Hit and Miss: Leverage, Sacrifice, and Refusal to Deal in the Supreme Court Decision in Trinko [PDF]

open access: yes
Under the rules of the Telecommunications Act of 1996, incumbent local exchange carriers, including Verizon, were obligated to lease parts of their local telecommunications network to any firm at “cost plus a reasonable profit” prices which could combine
Nicholas Economides
core  

Multi‐Dimensional Conductive Nanocomposites for Flexible Electronics

open access: yesENERGY &ENVIRONMENTAL MATERIALS, EarlyView.
Multi‐dimensional conductive nanocomposites integrate 0D, 1D, and 2D nanomaterials through spatial structure regulation and interface engineering, achieving “1 + 1 > 2” synergistic effects. By leveraging 0D filling to reduce contact resistance, 1D bridging to construct continuous conductive paths, and 2D supporting to enhance mechanical stability ...
Tianyu Wang   +12 more
wiley   +1 more source

Telecommunications Network Planning and Maintenance [PDF]

open access: yes, 2008
Telecommunications network operators are on a constant challenge to provide new services which require ubiquitous broadband access. In an attempt to do so, they are faced with many problems such as the network coverage or providing the guaranteed Quality
Alarcón Mondéjar, Martín Javier   +3 more
core   +1 more source

Digital Rights Activism in Multilevel Governance

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Telecommunications Regulation and New Services: a Case Study at the State Level [PDF]

open access: yes
The effects that regulation has on the innovation and the introduction of new telecommunications services have not been previously quantified in the literature. This study compares state-regulated services in Indiana under rate of return regulation (RoRR)
James E. Prieger
core  

A Deep Learning Framework for Forecasting Medium‐Term Covariance in Multiasset Portfolios

open access: yesJournal of Forecasting, EarlyView.
ABSTRACT Forecasting the covariance matrix of asset returns is central to portfolio construction, risk management, and asset pricing. However, most existing models struggle at medium‐term horizons, several weeks to months, where shifting market regimes and slower dynamics prevail.
Pedro Reis, Ana Paula Serra, João Gama
wiley   +1 more source

Trigonometric words ranking model for spam message classification

open access: yesIET Networks, EarlyView., 2022
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi   +7 more
wiley   +1 more source

The Many Faces of Talent Management: Organizational Perspectives on Talent and Talent Management Practices in Jordan

open access: yesHuman Resource Development Quarterly, EarlyView.
ABSTRACT Talent management involves the systematic planning, acquisition, development, performance management, engagement, and retention of employees identified as “talent.” Little is known about the relationship between organizations' talent perspectives and talent management practices.
Amro Aljbour, Erica French, Muhammad Ali
wiley   +1 more source

Design and implementation of geographic information system with mobile terminal and 5G network

open access: yesIET Networks, EarlyView., 2022
Abstract Remote insurance mainly completes quotation, insurance application and payment through the PC terminal and mobile terminal, and the premium directly enters the insurance account. This article takes remote insurance as an example. First, it analyses the requirements of the remote insurance and insurance system, and then collects data from the ...
Huijun Xiao, Tangsen Huang, Ensong Jiang
wiley   +1 more source

Home - About - Disclaimer - Privacy