Results 61 to 70 of about 150,216 (340)

Socially Trusted Collaborative Edge Computing in Ultra Dense Networks

open access: yes, 2017
Small cell base stations (SBSs) endowed with cloud-like computing capabilities are considered as a key enabler of edge computing (EC), which provides ultra-low latency and location-awareness for a variety of emerging mobile applications and the Internet ...
Chen, Lixing, Xu, Jie
core   +1 more source

Distributed intrusion detection trust management through integrity and expertise evaluation [PDF]

open access: yes, 2012
Information sharing and collaboration has facilitated decision accuracy and reaction time in many applications. Distributed Intrusion Detection Systems (DIDS) solutions are one of such applications that have dramatically been transformed.
Ab. Manan, Jamalul-Lail   +2 more
core   +1 more source

Effects of Pharmacologic and Nonpharmacologic Interventions for the Management of Sleep Problems in People With Fibromyalgia: Systematic Review and Network Meta‐Analysis of Randomized Controlled Trials

open access: yesArthritis Care &Research, EarlyView.
Objective Fibromyalgia is a chronic condition characterized by widespread musculoskeletal pain and fatigue. Almost everyone with fibromyalgia has sleep problems. We aimed to evaluate the effectiveness and safety of current interventions for the management of fibromyalgia‐related sleep problems.
Jemma Hudson   +11 more
wiley   +1 more source

American College of Rheumatology Guidance Statements for Addressing Mental Health Concerns in Youth With Pediatric Rheumatologic Diseases

open access: yesArthritis Care &Research, EarlyView.
Objective Pediatric rheumatologic diseases (PRDs) are characterized by high rates of anxiety and depression known to impact health‐related outcomes. We present guidance statements to assess and manage mental health concerns for youth with PRDs in pediatric rheumatology practice.
Natoshia R. Cunningham   +21 more
wiley   +1 more source

MS-LW-TI: Primitive-Based First-Order Threshold Implementation for 4 × 4 S-boxes

open access: yesIET Information Security
Threshold implementation (TI) is a lightweight countermeasure against side-channel attacks when glitches happen. As to masking schemes, an S-box is the key part to protection.
Botao Liu, Ming Tang
doaj   +1 more source

Longitudinal Relationship Between Pain and Depression in People With Inflammatory Arthritis: A Narrative Review

open access: yesArthritis Care &Research, EarlyView.
As many patients with inflammatory arthritis (IA) have chronic pain, understanding how to best assess and manage pain in IA is a priority. Comorbid depression is prevalent in adults with IA, affecting 15% to 39% of people. Although pain and depression are thought to be associated in IA, this concept is largely based on cross‐sectional data.
Natasha Cox   +3 more
wiley   +1 more source

Trusted Launch of Virtual Machine Instances in Public IaaS Environments [PDF]

open access: yes
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security
Aslam, Mudassar   +3 more
core   +3 more sources

Mchain: A Blockchain-Based VM Measurements Secure Storage Approach in IaaS Cloud With Enhanced Integrity and Controllability

open access: yesIEEE Access, 2018
Virtual machine (VM) measurements data in IaaS cloud play a crucial role in integrity evaluation and decision making. Hence, the secure storage for these data has attracted more attention recently.
Bo Zhao, Peiru Fan, Mingtao Ni
doaj   +1 more source

Understanding Contributors of Resilience in Youth With Childhood‐Onset Systemic Lupus Erythematosus Through a Socioecological Lens: A Mixed‐Methods Study

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to identify themes contributing to resilience in childhood‐onset systemic lupus erythematosus (cSLE), distinguish between profiles of resilience, and examine how they relate to underlying themes and patient characteristics. Methods We conducted a mixed‐methods study of 21 patients with cSLE aged 11 to 19 years at a Canadian ...
Isabella Zaffino   +12 more
wiley   +1 more source

Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States

open access: yesIEEE Access, 2019
Private comparison allows n(n ≥ 2) participants who do not trust each other to compare whether their secret data are the same, without leaking the secret data of their own.
Zhaoxu Ji, Huanguo Zhang, Houzhen Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy