Showing 101 - 120 results of 7,540 for search 'process sharing', query time: 0.13s Refine Results
  1. 101

    Asynchronous Quantum-Resistant Blockchain for Secure Intelligence Sharing by Yun-Yi Fan, Chit-Jie Chew, Jung-San Lee

    Published 2025-05-01
    “…By aggregating intelligence on emerging threats, attack techniques, and vulnerabilities, organizations can establish a more comprehensive threat landscape awareness and proactively identify potential risks. However, in the process of sharing threat intelligence, companies often hesitate due to concerns over information leakage, which reduces their willingness to collaborate. …”
    Get full text
    Article
  2. 102

    Experience and advice consequences shape information sharing strategies by Hernán Anlló, Gil Salamander, Nichola Raihani, Stefano Palminteri, Uri Hertz

    Published 2024-12-01
    “…Here we examine the way advising behaviour changes throughout the learning process, and the way individual traits and costs and benefits of giving advice shape this behaviour. …”
    Get full text
    Article
  3. 103

    Leveraging blockchain technology for carbon footprint information sharing by Shuhua Zhang, Wen Liu, Pengwen Hou

    Published 2025-02-01
    “…This paper investigates the information sharing strategies of green supply chains, greenwashing, and blockchain technology. …”
    Get full text
    Article
  4. 104
  5. 105

    Starrydata: from published plots to shared materials data by Yukari Katsura, Masaya Kumagai, Tomoya Mato, Yu Takada, Yuki Ando, Erina Fujita, Fumikazu Hosono, Eiji Koyama, Farhan Mudasar, Ton Nu Thanh Phuong, Naoto Saito, Yoshihiro Sakamoto, Atsumi Tanaka, Dewi Yana, Kaoru Kimura, Koji Tsuda, Masahiko Demura

    Published 2025-12-01
    “…It assists users worldwide in extracting and sharing curve data from plot images in published papers, along with relevant sample information such as chemical compositions and fabrication methods. …”
    Get full text
    Article
  6. 106

    Individual action, sharing scarce resources, sharing information? A study on how to effectively manage forest pests and diseases based on carbon trading. by Shansong Wu, Yuntao Bai, Jiahao Li, Yueling Yang

    Published 2025-01-01
    “…To incentivize corporations to manage forest pests and diseases, the government provides certain carbon compensations to enterprises involved in this management. In the process of controlling forest pests and diseases, the modes of collaboration between the government and corporations are primarily categorized into three modes: independent action, scarce resource sharing, and information sharing. …”
    Get full text
    Article
  7. 107
  8. 108

    Density Peak Clustering Algorithm Based on Shared Neighborhood by LI Fuxiang, ZHOU Ming, YANG Tianhao

    Published 2023-08-01
    “…To solve the problem of poor clustering performance and automatic determination of cluster center inthe processing of unevenly distributed datasets, a density peak clustering algorithm based on shared neighborhood is proposed ( DPC-SN) . …”
    Get full text
    Article
  9. 109

    Investments in the Sharing Economy and their Impact on the Employment Structural Changes by G. M. Galeeva, L Kh. Ishtiryakova

    Published 2020-10-01
    “…The article examines topical issues related to structural changes in employment in the Russian economy, due to the intensive development of the sharing economy. The aim of the study is to systematize disparate knowledge in assessing the impact of investments in the sharing economy on the employment structure, providing an understanding of the labor market, which is influenced by transformation processes in consumption patterns and factors of digitalization of the economy, as well as to develop recommendations for improving state policy in the field of employment. …”
    Get full text
    Article
  10. 110

    Shared and distinct neural signatures of feature and spatial attention by Anmin Yang, Jinhua Tian, Wenbo Wang, Liqin Zhou, Ke Zhou

    Published 2025-08-01
    “…Both FAS and SAS showed cross-task predictive capabilities, though inter-task prediction was weaker than intra-task prediction, suggesting both shared and distinct mechanisms. Specifically, the frontoparietal network exhibited the highest predictive performance for FA, while the visual network excelled in predicting SA, highlighting their respective prominence in the two attention processes. …”
    Get full text
    Article
  11. 111
  12. 112
  13. 113

    Invertible secret image sharing scheme based on improved FEMD by Limin MA, Jiahui WANG

    Published 2019-07-01
    “…Based on the improved FEMD algorithm an invertible secret image sharing scheme was proposed.Firstly,the embedding process of secret data was improved to make the original pixel pair and the stego pixel-pair to become a one-to-one mapping.Then a unique status flag was set to be calculated to record and process the original status of the over flow pixel-pair.Experimental data and analysis show that the proposed algorithm can guarantee the generation of high quality cryptographic images and solve the problem that the original carrier image can not be restored.…”
    Get full text
    Article
  14. 114
  15. 115

    Relocation Optimization for Shared Electric Vehicles: A Literature Review by Ye Zou, Qian Yu, Dongming Jiang, Youjun Deng

    Published 2025-02-01
    “…The paper finally provides some interesting future research topics, such as considering the nonlinear charging process of electric vehicles in the process of constructing relocation optimization models and designing algorithms for shared electric vehicles.…”
    Get full text
    Article
  16. 116

    Trans-Disciplinary Communication in Collaborative Co-Design for Knowledge Sharing by James Lipuma, Cristo Leon

    Published 2024-02-01
    “…Finally, some practical, real-world examples of TDC in action for CCD will be shared. By illustrating practical, real-world examples of TDC in an effort for CCD, the article offers an insightful overview of this empowering process, not merely as a theoretical construct but as a dynamic and practical approach. …”
    Get full text
    Article
  17. 117

    User preferences in ride-sharing mathematical models for enhanced matching by Zahra Dastani, Hamidreza Koosha, Hossein Karimi, Abolfazl Mohammadzadeh Moghaddam

    Published 2024-11-01
    “…This study proposes a mathematical programming model that integrates user preferences into the ride-sharing problem with transfer. Passenger transfer in ride-sharing problems addresses the limitations of the matching process, especially in less-populated areas. …”
    Get full text
    Article
  18. 118

    Implementation of Access and Benefit Sharing in The Bahamas: A Precautionary Tale by Krista Sherman, Craig Dahlgren, Charlotte Dunn, Diane Claridge, Nicholas Higgs

    Published 2025-01-01
    “…However, the newly implemented access and benefit sharing (ABS) regime is undermining scientific research, which is essential to effectively manage and conserve the country’s biodiversity. …”
    Get full text
    Article
  19. 119

    Provably secure secret sharing scheme based on bilinear maps by LI Hui-xian1, PANG Liao-jun2

    Published 2008-01-01
    “…A method to construct provable secure secret sharing scheme using bilinear pairing was recommended.Firstly,the semantic security definition for secret sharing scheme is given,which is developed from the standard definition of semantic security for the public key cryptosystems.Then,a new secret sharing scheme based on the bilinear maps is pro-posed,with its correctness,security and performance analyzed and proven subsequently.Compared with the existing schemes,the proposed scheme is provably secure.At the same time,the proposed scheme departs the private key compu-tation of participants from the secret distribution process and the dealer does not have to securely save each participant’s private key,which makes this scheme more secure and more efficient.Therefore,the proposed scheme is more applicable than the existing ones.…”
    Get full text
    Article
  20. 120

    Key distribution and recovery algorithm based on Shamir's secret sharing by Hui-gui RONG, Jin-xia MO, Bing-guo CHANG, Guang SUN, Fei LONG

    Published 2015-03-01
    “…In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about the secret s. …”
    Get full text
    Article