Results 81 to 90 of about 389,519 (223)

A Workflow for Selecting, Profiling, and Optimizing Plant Extracts for Cosmetic Applications

open access: yesChemistry &Biodiversity, Volume 22, Issue 12, December 2025.
ABSTRACT In response to the growing demand for innovative natural ingredients in cosmetics, this study proposes a structured approach to identifying bioactive plant species available in France. From 1614 species screened for regulatory acceptability and innovation potential, 18 were shortlisted for phytochemical profiling (high‐performance liquid ...
Maria Viéytez   +4 more
wiley   +1 more source

A Framework for Exploring and Evaluating Mechanics in Human Computation Games

open access: yes, 2017
Human computation games (HCGs) are a crowdsourcing approach to solving computationally-intractable tasks using games. In this paper, we describe the need for generalizable HCG design knowledge that accommodates the needs of both players and tasks.
Krause Markus   +3 more
core   +1 more source

TOWARD A CONJECTURAL HISTORY OF CONJECTURAL HISTORIES

open access: yesHistory and Theory, Volume 64, Issue 4, Page 56-74, December 2025.
ABSTRACT Most intellectual historians use the term “conjectural history” to designate a new form of speculative history created in eighteenth‐century Scotland by Adam Smith and a few others. These writers traced the development of human society and culture through conjectural reasoning based on philosophers’ views about human nature and travelers ...
ANTHONY GRAFTON
wiley   +1 more source

The Political Maturity of Youths and Young Adults: Empirical Evidence from Switzerland

open access: yesSwiss Political Science Review, Volume 31, Issue 4, Page 771-788, December 2025.
Abstract The debate on voting age 16 is intensifying all over Europe, raising important empirical questions about the political maturity of underage citizens. Building on a survey of 4,000 young citizens aged 16 to 25 years, we shed light on the Swiss context.
Robin Gut, Juri Ezzaini, Daniel Kübler
wiley   +1 more source

Foundations, Properties, and Security Applications of Puzzles: A Survey

open access: yes, 2020
Cryptographic algorithms have been used not only to create robust ciphertexts but also to generate cryptograms that, contrary to the classic goal of cryptography, are meant to be broken.
Ali, Isra Mohamed   +2 more
core  

Associations of Graded Chronic Non‐Cancer Pain Severity With Well‐Being and Modifiable Lifestyle Behaviour: Findings From a Danish Population‐Based Cross‐Sectional Survey

open access: yesEuropean Journal of Pain, Volume 29, Issue 10, November 2025.
ABSTRACT Background The Graded Chronic Pain Scale‐Revised (GCPS‐R) framework enables a standardised measure of disease severity and was incorporated into the national disease surveillance in Denmark in 2023. Novel dose–response associations between GCPS‐R‐systemised disease severity, general health, well‐being, and modifiable lifestyle behaviour were ...
Sophie Sell Hellmann   +7 more
wiley   +1 more source

Verifiability in Markets for Credence Goods [PDF]

open access: yes, 2009
Theory predicts that efficiency prevails on credence goods markets if customers are able to verify which quality they receive from an expert seller.
Dulleck, Uwe   +2 more
core   +2 more sources

Monitoring-Oriented Programming: A Tool-Supported Methodology for Higher Quality Object-Oriented Software [PDF]

open access: yes, 2004
This paper presents a tool-supported methodological paradigm for object-oriented software development, called monitoring-oriented programming and abbreviated MOP, in which runtime monitoring is a basic software design principle.
Chen, Feng   +2 more
core  

Refining Nodes and Edges of State Machines [PDF]

open access: yes, 2011
State machines are hierarchical automata that are widely used to structure complex behavioural specifications. We develop two notions of refinement of state machines, node refinement and edge refinement.
A. Kaldewaij   +13 more
core   +1 more source

Crypto-Verifying Protocol Implementations in ML [PDF]

open access: yes, 2007
We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational ...
Bhargavan, K., Corin, R.J., Fournet, C.
core   +6 more sources

Home - About - Disclaimer - Privacy