Results 61 to 70 of about 150,216 (340)
Socially Trusted Collaborative Edge Computing in Ultra Dense Networks
Small cell base stations (SBSs) endowed with cloud-like computing capabilities are considered as a key enabler of edge computing (EC), which provides ultra-low latency and location-awareness for a variety of emerging mobile applications and the Internet ...
Chen, Lixing, Xu, Jie
core +1 more source
Distributed intrusion detection trust management through integrity and expertise evaluation [PDF]
Information sharing and collaboration has facilitated decision accuracy and reaction time in many applications. Distributed Intrusion Detection Systems (DIDS) solutions are one of such applications that have dramatically been transformed.
Ab. Manan, Jamalul-Lail+2 more
core +1 more source
Objective Fibromyalgia is a chronic condition characterized by widespread musculoskeletal pain and fatigue. Almost everyone with fibromyalgia has sleep problems. We aimed to evaluate the effectiveness and safety of current interventions for the management of fibromyalgia‐related sleep problems.
Jemma Hudson+11 more
wiley +1 more source
Objective Pediatric rheumatologic diseases (PRDs) are characterized by high rates of anxiety and depression known to impact health‐related outcomes. We present guidance statements to assess and manage mental health concerns for youth with PRDs in pediatric rheumatology practice.
Natoshia R. Cunningham+21 more
wiley +1 more source
MS-LW-TI: Primitive-Based First-Order Threshold Implementation for 4 × 4 S-boxes
Threshold implementation (TI) is a lightweight countermeasure against side-channel attacks when glitches happen. As to masking schemes, an S-box is the key part to protection.
Botao Liu, Ming Tang
doaj +1 more source
As many patients with inflammatory arthritis (IA) have chronic pain, understanding how to best assess and manage pain in IA is a priority. Comorbid depression is prevalent in adults with IA, affecting 15% to 39% of people. Although pain and depression are thought to be associated in IA, this concept is largely based on cross‐sectional data.
Natasha Cox+3 more
wiley +1 more source
Trusted Launch of Virtual Machine Instances in Public IaaS Environments [PDF]
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security
Aslam, Mudassar+3 more
core +3 more sources
Virtual machine (VM) measurements data in IaaS cloud play a crucial role in integrity evaluation and decision making. Hence, the secure storage for these data has attracted more attention recently.
Bo Zhao, Peiru Fan, Mingtao Ni
doaj +1 more source
Objective This study aimed to identify themes contributing to resilience in childhood‐onset systemic lupus erythematosus (cSLE), distinguish between profiles of resilience, and examine how they relate to underlying themes and patient characteristics. Methods We conducted a mixed‐methods study of 21 patients with cSLE aged 11 to 19 years at a Canadian ...
Isabella Zaffino+12 more
wiley +1 more source
Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States
Private comparison allows n(n ≥ 2) participants who do not trust each other to compare whether their secret data are the same, without leaking the secret data of their own.
Zhaoxu Ji, Huanguo Zhang, Houzhen Wang
doaj +1 more source