Suggested Topics within your search.
Suggested Topics within your search.
-
101
Asynchronous Quantum-Resistant Blockchain for Secure Intelligence Sharing
Published 2025-05-01“…By aggregating intelligence on emerging threats, attack techniques, and vulnerabilities, organizations can establish a more comprehensive threat landscape awareness and proactively identify potential risks. However, in the process of sharing threat intelligence, companies often hesitate due to concerns over information leakage, which reduces their willingness to collaborate. …”
Get full text
Article -
102
Experience and advice consequences shape information sharing strategies
Published 2024-12-01“…Here we examine the way advising behaviour changes throughout the learning process, and the way individual traits and costs and benefits of giving advice shape this behaviour. …”
Get full text
Article -
103
Leveraging blockchain technology for carbon footprint information sharing
Published 2025-02-01“…This paper investigates the information sharing strategies of green supply chains, greenwashing, and blockchain technology. …”
Get full text
Article -
104
Walking on the tightrope: the shared roles of the bridging pericytes in the brain
Published 2025-07-01Get full text
Article -
105
Starrydata: from published plots to shared materials data
Published 2025-12-01“…It assists users worldwide in extracting and sharing curve data from plot images in published papers, along with relevant sample information such as chemical compositions and fabrication methods. …”
Get full text
Article -
106
Individual action, sharing scarce resources, sharing information? A study on how to effectively manage forest pests and diseases based on carbon trading.
Published 2025-01-01“…To incentivize corporations to manage forest pests and diseases, the government provides certain carbon compensations to enterprises involved in this management. In the process of controlling forest pests and diseases, the modes of collaboration between the government and corporations are primarily categorized into three modes: independent action, scarce resource sharing, and information sharing. …”
Get full text
Article -
107
-
108
Density Peak Clustering Algorithm Based on Shared Neighborhood
Published 2023-08-01“…To solve the problem of poor clustering performance and automatic determination of cluster center inthe processing of unevenly distributed datasets, a density peak clustering algorithm based on shared neighborhood is proposed ( DPC-SN) . …”
Get full text
Article -
109
Investments in the Sharing Economy and their Impact on the Employment Structural Changes
Published 2020-10-01“…The article examines topical issues related to structural changes in employment in the Russian economy, due to the intensive development of the sharing economy. The aim of the study is to systematize disparate knowledge in assessing the impact of investments in the sharing economy on the employment structure, providing an understanding of the labor market, which is influenced by transformation processes in consumption patterns and factors of digitalization of the economy, as well as to develop recommendations for improving state policy in the field of employment. …”
Get full text
Article -
110
Shared and distinct neural signatures of feature and spatial attention
Published 2025-08-01“…Both FAS and SAS showed cross-task predictive capabilities, though inter-task prediction was weaker than intra-task prediction, suggesting both shared and distinct mechanisms. Specifically, the frontoparietal network exhibited the highest predictive performance for FA, while the visual network excelled in predicting SA, highlighting their respective prominence in the two attention processes. …”
Get full text
Article -
111
Role of knowledge management practices for escalating universities’ performance in Pakistan
Published 2015-10-01Subjects: “…Knowledge management processes…”
Get full text
Article -
112
Selected Topics in Management and Modeling of Complex Systems: Editorial Introduction to Issue 16 of CSIMQ
Published 2018-10-01Subjects: Get full text
Article -
113
Invertible secret image sharing scheme based on improved FEMD
Published 2019-07-01“…Based on the improved FEMD algorithm an invertible secret image sharing scheme was proposed.Firstly,the embedding process of secret data was improved to make the original pixel pair and the stego pixel-pair to become a one-to-one mapping.Then a unique status flag was set to be calculated to record and process the original status of the over flow pixel-pair.Experimental data and analysis show that the proposed algorithm can guarantee the generation of high quality cryptographic images and solve the problem that the original carrier image can not be restored.…”
Get full text
Article -
114
Unintended Consequences of Data Sharing Under the Meaningful Use Program
Published 2024-11-01Get full text
Article -
115
Relocation Optimization for Shared Electric Vehicles: A Literature Review
Published 2025-02-01“…The paper finally provides some interesting future research topics, such as considering the nonlinear charging process of electric vehicles in the process of constructing relocation optimization models and designing algorithms for shared electric vehicles.…”
Get full text
Article -
116
Trans-Disciplinary Communication in Collaborative Co-Design for Knowledge Sharing
Published 2024-02-01“…Finally, some practical, real-world examples of TDC in action for CCD will be shared. By illustrating practical, real-world examples of TDC in an effort for CCD, the article offers an insightful overview of this empowering process, not merely as a theoretical construct but as a dynamic and practical approach. …”
Get full text
Article -
117
User preferences in ride-sharing mathematical models for enhanced matching
Published 2024-11-01“…This study proposes a mathematical programming model that integrates user preferences into the ride-sharing problem with transfer. Passenger transfer in ride-sharing problems addresses the limitations of the matching process, especially in less-populated areas. …”
Get full text
Article -
118
Implementation of Access and Benefit Sharing in The Bahamas: A Precautionary Tale
Published 2025-01-01“…However, the newly implemented access and benefit sharing (ABS) regime is undermining scientific research, which is essential to effectively manage and conserve the country’s biodiversity. …”
Get full text
Article -
119
Provably secure secret sharing scheme based on bilinear maps
Published 2008-01-01“…A method to construct provable secure secret sharing scheme using bilinear pairing was recommended.Firstly,the semantic security definition for secret sharing scheme is given,which is developed from the standard definition of semantic security for the public key cryptosystems.Then,a new secret sharing scheme based on the bilinear maps is pro-posed,with its correctness,security and performance analyzed and proven subsequently.Compared with the existing schemes,the proposed scheme is provably secure.At the same time,the proposed scheme departs the private key compu-tation of participants from the secret distribution process and the dealer does not have to securely save each participant’s private key,which makes this scheme more secure and more efficient.Therefore,the proposed scheme is more applicable than the existing ones.…”
Get full text
Article -
120
Key distribution and recovery algorithm based on Shamir's secret sharing
Published 2015-03-01“…In Shamir's secret sharing scheme, the dealer divided the secret s into n shadows and distributed it to share-holders in such a way that any t or more than t shadows can recover this secret, while fewer than t shadows cannot obtain any information about the secret s. …”
Get full text
Article