Results 61 to 70 of about 160,167 (287)

Mchain: A Blockchain-Based VM Measurements Secure Storage Approach in IaaS Cloud With Enhanced Integrity and Controllability

open access: yesIEEE Access, 2018
Virtual machine (VM) measurements data in IaaS cloud play a crucial role in integrity evaluation and decision making. Hence, the secure storage for these data has attracted more attention recently.
Bo Zhao, Peiru Fan, Mingtao Ni
doaj   +1 more source

Structure and Sequence Aligned Code Summarization with Prefix and Suffix Balanced Strategy

open access: yesEntropy, 2023
Source code summarization focuses on generating qualified natural language descriptions of a code snippet (e.g., functionality, usage and version). In an actual development environment, descriptions of the code are missing or not consistent with the code
Jianhui Zeng, Zhiheng Qu, Bo Cai
doaj   +1 more source

Trustworthy content push

open access: yes, 2007
Delivery of content to mobile devices gains increasing importance in industrial environments to support employees in the field. An important application are e-mail push services like the fashionable Blackberry.
Kuntze, Nicolai, Schmidt, Andreas U.
core   +2 more sources

Overview of molecular signatures of senescence and associated resources: pros and cons

open access: yesFEBS Open Bio, EarlyView.
Cells can enter a stress response state termed cellular senescence that is involved in various diseases and aging. Detecting these cells is challenging due to the lack of universal biomarkers. This review presents the current state of senescence identification, from biomarkers to molecular signatures, compares tools and approaches, and highlights ...
Orestis A. Ntintas   +6 more
wiley   +1 more source

Rlaph: a lightweight and dynamic proactive defense method in cloud-edge collaboration

open access: yesCybersecurity
In cloud-edge collaboration scenarios, attackers pose significant security risks by compromising computational nodes and using them to infiltrate other nodes and networks.
Yingbo Li   +6 more
doaj   +1 more source

Cycle ORAM: A Practical Protection for Access Pattern in Untrusted Storage

open access: yesIEEE Access, 2019
Oblivious RAM (ORAM) is a cryptographic primitive to hide memory access pattern in untrusted storage, but the cost remains prohibitively expensive. This paper proposes cycle ORAM, an improvement of Ring ORAM for small client setting.
Bo Zhao, Zhihong Chen, Hai Lin
doaj   +1 more source

Citizen Electronic Identities using TPM 2.0

open access: yes, 2014
Electronic Identification (eID) is becoming commonplace in several European countries. eID is typically used to authenticate to government e-services, but is also used for other services, such as public transit, e-banking, and physical security access ...
Asokan, N.   +2 more
core   +1 more source

Applicability of mitotic figure counting by deep learning: a development and pan‐cancer validation study

open access: yesFEBS Open Bio, EarlyView.
In this study, we developed a deep learning method for mitotic figure counting in H&E‐stained whole‐slide images and evaluated its prognostic impact in 13 external validation cohorts from seven different cancer types. Patients with more mitotic figures per mm2 had significantly worse patient outcome in all the studied cancer types except colorectal ...
Joakim Kalsnes   +32 more
wiley   +1 more source

A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure

open access: yesFoods
The food and agriculture sector is a cornerstone of critical infrastructure (CI), underpinning global food security, public health, and economic stability.
Chengliang Zheng   +9 more
doaj   +1 more source

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

Home - About - Disclaimer - Privacy