Results 91 to 100 of about 124,809 (301)
ABSTRACT This study aims to explore the influence of Wine Tourism (WT) on the Sustainable Performance (SP) of wineries in Spain. It particularly investigates how Corporate Social Legitimacy (CSL) and Green Innovation (GI) may act as intermediary factors in this relationship.
Javier Martínez‐Falcó +3 more
wiley +1 more source
A TEE-Based Federated Privacy Protection Method: Proposal and Implementation
With the continuous enhancement of privacy protection globally, there is a problem for the traditional machine learning paradigm, which is that training data cannot be obtained from a single place.
Libo Zhang +4 more
doaj +1 more source
RAitc: Securely Auditing the Remotely Executed Applications
One of the most important security challenges in remote computing (e.g., cloud computing) is protecting users’ applications running on the service platform from malicious attacks.
Lei Zhou, Entao Luo, Guojun Wang
doaj +1 more source
Secure Virtualization and Multicore Platforms State-of-the-Art report [PDF]
SVaM
Douglas, Heradon, Gehrmann, Christian
core +1 more source
Large Language Model in Materials Science: Roles, Challenges, and Strategic Outlook
Large language models (LLMs) are reshaping materials science. Acting as Oracle, Surrogate, Quant, and Arbiter, they now extract knowledge, predict properties, gauge risk, and steer decisions within a traceable loop. Overcoming data heterogeneity, hallucinations, and poor interpretability demands domain‐adapted models, cross‐modal data standards, and ...
Jinglan Zhang +4 more
wiley +1 more source
Quadrotor unmanned aerial vehicle control is critical to maintain flight safety and efficiency, especially when facing external disturbances and model uncertainties. This article presents a robust reinforcement learning control scheme to deal with these challenges.
Yu Cai +3 more
wiley +1 more source
Clean Cut is a multimodal, adaptive, checklist‐based infection prevention programme designed to improve compliance with six critical perioperative infection prevention practices. After introducing the programme at five hospitals in Ethiopia, compliance with critical infection prevention standards significantly improved and the relative risk of ...
J. A. Forrester +16 more
wiley +1 more source
Index Obfuscation for Oblivious Document Retrieval in a Trusted Execution Environment [PDF]
Jinjin Shao +5 more
openalex +1 more source
Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian +37 more
wiley +1 more source
Dual system trusted terminal computing architecture based on TPCM RoT
Due to the limitations of the times, the von Neumann computer system failed to consider the modern security environment, and the computing structure lacked independent protective components based on hardware trusted roots. A trusted terminal architecture
HUANG Jianhui +3 more
doaj

