Results 21 to 30 of about 150,216 (340)

FBANet: Transfer Learning for Depression Recognition Using a Feature-Enhanced Bi-Level Attention Network

open access: yesEntropy, 2023
The House-Tree-Person (HTP) sketch test is a psychological analysis technique designed to assess the mental health status of test subjects. Nowadays, there are mature methods for the recognition of depression using the HTP sketch test.
Huayi Wang   +3 more
doaj   +1 more source

A national trusted computing strategy [PDF]

open access: yes, 2002
Through neglect, the national capability to design and construct trusted computers and networks has begun to atrophy. Not only has the information infrastructure been built weakly, but also our capability to strengthen it continues to decline. The Nation
Dinolt, George W., Levin, Timothy E.
core   +1 more source

Hyperledger Fabric Access Control System for Internet of Things Layer in Blockchain-Based Applications

open access: yesEntropy, 2021
Blockchain-based applications are gaining traction in various application fields, including supply chain management, health care, and finance. The Internet of Things (IoT) is a critical component of these applications since it allows for data collection ...
Adnan Iftekhar   +3 more
doaj   +1 more source

A Transformer-Based Hierarchical Variational AutoEncoder Combined Hidden Markov Model for Long Text Generation

open access: yesEntropy, 2021
The Variational AutoEncoder (VAE) has made significant progress in text generation, but it focused on short text (always a sentence). Long texts consist of multiple sentences.
Kun Zhao   +3 more
doaj   +1 more source

Towards a new framework for TPM compliance testing [PDF]

open access: yes, 2014
Trusted Computing Group (TCG) has proposed the Trusted Computing (TC) concept. Subsequently, TC becomes a common base for many new computing platforms, called Trusted Platform (TP) architecture (hardware and software) that, practically, has a built-in ...
Ab. Manan, Jamalul-lail   +2 more
core   +2 more sources

Trust models in ubiquitous computing [PDF]

open access: yesPhilosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 2008
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.
Krukow, Karl   +2 more
openaire   +4 more sources

Measurement and Analysis of P2P IPTV Program Resource

open access: yesThe Scientific World Journal, 2014
With the rapid development of P2P technology, P2P IPTV applications have received more and more attention. And program resource distribution is very important to P2P IPTV applications.
Wenxian Wang   +4 more
doaj   +1 more source

Hybridchain: A Novel Architecture for Confidentiality-Preserving and Performant Permissioned Blockchain Using Trusted Execution Environment

open access: yesIEEE Access, 2020
Blockchain is making headlines due to it promises to provide a decentralized, transparent, tamper-resistant, traceable and verifiable historical transaction records that can resist faults of any single node. According to the latest data from State of the
Yong Wang   +3 more
doaj   +1 more source

Blockchain and Machine Learning in EHR Security: A Systematic Review

open access: yesIEEE Access, 2023
Background: The rapid development of modern technologies renders a convenient and efficient solution to implement Electronic Health Records (EHRs) systems. The rapid growth of healthcare data has a distinctive attribute of digital transformations.
Umer Zukaib   +5 more
doaj   +1 more source

Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach [PDF]

open access: yes, 2012
The use of clouds raises significant security concerns for the services they provide. Addressing these concerns requires novel models of cloud service certification based on multiple forms of evidence including testing and monitoring data, and trusted ...
Damiani, E., MaƱa, A., Spanoudakis, G.
core   +1 more source

Home - About - Disclaimer - Privacy