Results 51 to 60 of about 305,823 (288)

Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service

open access: yes, 2016
Database as a service provides services for accessing and managing customers data which provides ease of access, and the cost is less for these services. There is a possibility that the DBaaS service provider may not be trusted, and data may be stored on
E Bertino   +3 more
core   +1 more source

Artificial Intelligence for Bone: Theory, Methods, and Applications

open access: yesAdvanced Intelligent Discovery, EarlyView.
Advances in artificial intelligence (AI) offer the potential to improve bone research. The current review explores the contributions of AI to pathological study, biomarker discovery, drug design, and clinical diagnosis and prognosis of bone diseases. We envision that AI‐driven methodologies will enable identifying novel targets for drugs discovery. The
Dongfeng Yuan   +3 more
wiley   +1 more source

SECURE AND ENERGY AWARE TASK SCHEDULING IN CLOUD USING DEEP LEARNING AND CRYPTOGRAPHIC TECHNIQUES

open access: yesICTACT Journal on Communication Technology, 2021
Cloud Computing is one amid emerging technology greatly necessitated aiding computing on demand services by letting users for subsequent pay-per-use-on-demand scheme.
S Rekha, C Kalaiselvi
doaj  

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

Detecting web server take-over attacks through objective verification actions [PDF]

open access: yes, 2013
Attacks targeting web servers pose a major security threat. Typically prone to a mix of infrastructure and application-level security vulnerabilities, they serve as the lowest hanging fruit for intruders wanting to gain unauthorized access to the entire ...
Computer Science Annual Workshop CSAW’13   +2 more
core  

An Intelligent Feature Engineering‐Driven Hybrid Framework for Adversarial Domain Name System Tunneling Detection

open access: yesAdvanced Intelligent Systems, EarlyView.
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor   +5 more
wiley   +1 more source

Interest-Based Access Control for Content Centric Networks (extended version)

open access: yes, 2015
Content-Centric Networking (CCN) is an emerging network architecture designed to overcome limitations of the current IP-based Internet. One of the fundamental tenets of CCN is that data, or content, is a named and addressable entity in the network ...
Ghali, Cesar   +3 more
core   +1 more source

SiOx‐Based Probabilistic Bits Enabling Invertible Logic Gate for Cryptographic Applications

open access: yesAdvanced Intelligent Systems, EarlyView.
To enable lightweight hardware encryption and decryption, a Ti/SiOx/Ti threshold switching device is engineered to generate controllable stochastic oscillations. By tuning the input voltage, the device produces a programmable spike probability governed by intrinsic switching dynamics, enabling probabilistic bits that construct an invertible ...
Jihyun Kim, Hyeonsik Choi, Jiyong Woo
wiley   +1 more source

Access Not Denied? The Role American Localities Can Play

open access: yesField Actions Science Reports, 2010
San Francisco represents a unique case in the United States in that it has enacted a set of inclusive policies at the local level to increase unauthorized immigrants’ access to and utilization of health care. Based on interviews conducted with 36 primary
Helen B. Marrow
doaj  

Bypassing Civil Gideon: A Legislative Proposal [PDF]

open access: yes, 2012
Eighty-four percent of immigrants appearing before immigration judges are unrepresented. Immigration judges are overwhelmed with the dual role of adjudicating cases and serving as counsel to pro se individuals appearing before them.
Corcoran, Erin B.
core   +1 more source

Home - About - Disclaimer - Privacy