Results 51 to 60 of about 17,798 (178)

Hypervisor Integrity Measurement Assistant [PDF]

open access: yes, 2012
An attacker who has gained access to a computer may want to upload or modify configuration files, etc., and run arbitrary programs of his choice. We can severely restrict the power of the attacker by having a white-list of approved file checksums and ...
Rajabi Nasab, Mazdak, Rasmusson, Lars
core   +1 more source

Malware detection techniques for mobile devices

open access: yes, 2017
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core   +1 more source

FIRE: A Human‐Centered Framework for Digital Twin Design

open access: yesSystems Engineering, Volume 29, Issue 1, Page 34-48, January 2026.
ABSTRACT The integration of human perspectives into digital twin (DT) design for sociotechnical systems (STS) is essential for addressing the complex relationship between social and technical elements. Despite advances in DT technology, its application to STS demands a human‐centered approach that considers usability, user experience, and contextual ...
Dimitri Masson, Eric Villeneuve
wiley   +1 more source

Transforming Requirement Elicitation Through Gamification—A Comprehensive Review

open access: yesHuman Behavior and Emerging Technologies, Volume 2026, Issue 1, 2026.
Software projects go through a cycle of development, the initial phase of this cycle is proposed by collecting requirements. A successful software has high quality requirements that are complete, clear, and concise. For these requirements, effective RE strategies are required.
Zarsha Nazim   +5 more
wiley   +1 more source

Through My Eyes: Integrative Model of Awareness‐Raising (IMAR)

open access: yesHuman Behavior and Emerging Technologies, Volume 2026, Issue 1, 2026.
Thanks to the phenomena of presence and embodiment, immersive virtual reality makes it possible to create situations that influence users’ mental representations. This can deepen understanding of another person’s perspective and foster compassion and motivation for prosocial behavior.
Abdelmajid Kadri   +3 more
wiley   +1 more source

Commentary on “An alternative to working on machine consciousness”, by Aaron Sloman [PDF]

open access: yes, 2009
A commentary on a current paper by Aaron Sloman where he argues that in order to make progress in AI, consciousness (and other such unclear concepts of common-sense regarding the mind), "should be replaced by more precise and varied architecture-based ...
Legg, Catherine
core  

Psychological Recovery of “Second Victims” After Adverse Events: Experiences From Generation Z Emergency Nurses

open access: yesJournal of Nursing Management, Volume 2026, Issue 1, 2026.
Background The second victim (SV) phenomenon is common among nurses in emergency departments. SVs may experience positive changes and achieve psychological recovery due to new insights or gains, even while enduring second victim syndrome (SVS). Generation Z emergency nurses (ENs) in China possess distinct life experiences compared with previous ...
Yue Liu   +9 more
wiley   +1 more source

Uncovering Language Teacher Educators' Collective and Individual Identities in Times of Change: Engaging With the Affective Turn

open access: yesTESOL Journal, Volume 16, Issue 4, December 2025.
ABSTRACT As the world experiences drastic revolutions in technology usage, hyperconnectivity, and extreme political orientations, critical reflexivity in teacher education appears more crucial than ever. Particularly, it is extremely relevant to explore the ways in which teacher educators' individual identities intertwine with collective identities ...
Sreemali Herath, Isabel Tejada‐Sanchez
wiley   +1 more source

Cohabitation: Computation at 70, Cognition at 20 [PDF]

open access: yes, 2009
Zenon Pylyshyn cast cognition's lot with computation, stretching the Church/Turing Thesis to its limit: We had no idea how the mind did anything, whereas we knew computation could do just about everything. Doing it with images would be like doing it with
Harnad, Stevan
core  

Home - About - Disclaimer - Privacy