Results 51 to 60 of about 17,798 (178)
Hypervisor Integrity Measurement Assistant [PDF]
An attacker who has gained access to a computer may want to upload or modify configuration files, etc., and run arbitrary programs of his choice. We can severely restrict the power of the attacker by having a white-list of approved file checksums and ...
Rajabi Nasab, Mazdak, Rasmusson, Lars
core +1 more source
Malware detection techniques for mobile devices
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core +1 more source
FIRE: A Human‐Centered Framework for Digital Twin Design
ABSTRACT The integration of human perspectives into digital twin (DT) design for sociotechnical systems (STS) is essential for addressing the complex relationship between social and technical elements. Despite advances in DT technology, its application to STS demands a human‐centered approach that considers usability, user experience, and contextual ...
Dimitri Masson, Eric Villeneuve
wiley +1 more source
Transforming Requirement Elicitation Through Gamification—A Comprehensive Review
Software projects go through a cycle of development, the initial phase of this cycle is proposed by collecting requirements. A successful software has high quality requirements that are complete, clear, and concise. For these requirements, effective RE strategies are required.
Zarsha Nazim +5 more
wiley +1 more source
Through My Eyes: Integrative Model of Awareness‐Raising (IMAR)
Thanks to the phenomena of presence and embodiment, immersive virtual reality makes it possible to create situations that influence users’ mental representations. This can deepen understanding of another person’s perspective and foster compassion and motivation for prosocial behavior.
Abdelmajid Kadri +3 more
wiley +1 more source
Commentary on “An alternative to working on machine consciousness”, by Aaron Sloman [PDF]
A commentary on a current paper by Aaron Sloman where he argues that in order to make progress in AI, consciousness (and other such unclear concepts of common-sense regarding the mind), "should be replaced by more precise and varied architecture-based ...
Legg, Catherine
core
Background The second victim (SV) phenomenon is common among nurses in emergency departments. SVs may experience positive changes and achieve psychological recovery due to new insights or gains, even while enduring second victim syndrome (SVS). Generation Z emergency nurses (ENs) in China possess distinct life experiences compared with previous ...
Yue Liu +9 more
wiley +1 more source
ABSTRACT As the world experiences drastic revolutions in technology usage, hyperconnectivity, and extreme political orientations, critical reflexivity in teacher education appears more crucial than ever. Particularly, it is extremely relevant to explore the ways in which teacher educators' individual identities intertwine with collective identities ...
Sreemali Herath, Isabel Tejada‐Sanchez
wiley +1 more source
Cohabitation: Computation at 70, Cognition at 20 [PDF]
Zenon Pylyshyn cast cognition's lot with computation, stretching the Church/Turing Thesis to its limit: We had no idea how the mind did anything, whereas we knew computation could do just about everything. Doing it with images would be like doing it with
Harnad, Stevan
core

