We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 4,523 results
  1. Grants4Companies: Applying Declarative Methods for Recommending and Reasoning About Business Grants in the Austrian Public Administration (System Description)

    We describe the methods and technologies underlying the application Grants4Companies. The application uses a logic-based expert system to display a...
    Björn Lellmann, Philipp Marek, Markus Triska in Functional and Logic Programming
    Conference paper 2024
  2. Technological Model Based on Blockchain Technology for Genetic Information Protection in the Health Sector

    In the health industry, the transparency of product data registration in the supply chain is a critical aspect in determining the source of genetic...
    Julio Arroyo-Mariños, Karla Mejia-Valle, Willy Ugarte in Information and Communication Technologies for Ageing Well and e-Health
    Conference paper 2023
  3. RoboStar Technology: A Roboticist’s Toolbox for Combined Proof, Simulation, and Testing

    Simulation is favored by roboticists to evaluate controller design and software. Often, state machines are drawn to convey overall ideas and used as...
    Ana Cavalcanti, Will Barnett, ... Augusto Sampaio in Software Engineering for Robotics
    Chapter 2021
  4. Deploying Post-quantum Algorithms in Existing Applications and Embedded Devices

    This document studies the current state of post-quantum cryptography implementation feasibility, providing general approaches that developers and...
    Petr Muzikant, Jan Willemson in Ubiquitous Security
    Conference paper 2024
  5. Resources for Comparative Analysis of IDN Authoring Tools

    Authoring tools are a crucial component in the practice and research of interactive digital narrative design, yet there is no contemporary knowledge...
    Yotam Shibolet, Vincenzo Lombardo in Interactive Storytelling
    Conference paper 2022
  6. Kurz erklärt: Measuring Data Changes in Data Engineering and their Impact on Explainability and Algorithm Fairness

    Data engineering is an integral part of any data science and ML process. It consists of several subtasks that are performed to improve data quality...

    Meike Klettke, Adrian Lutsch, Uta Störl in Datenbank-Spektrum
    Article Open access 27 October 2021
  7. A Formal Theory of Choreographic Programming

    Choreographic programming is a paradigm for writing coordination plans for distributed systems from a global point of view, from which...

    Luís Cruz-Filipe, Fabrizio Montesi, Marco Peressotti in Journal of Automated Reasoning
    Article Open access 27 May 2023
  8. Formal verification for security and attacks in IoT physical layer

    IoT devices are more important than ever. In a connected world, IoT devices have many uses. They are no longer merely used at work; they are part of...

    Zinah Hussein Toman, Lazhar Hamel, ... Dalton Cézane Gomes Valadares in Journal of Reliable Intelligent Environments
    Article 06 May 2023
  9. Brief Announcement: Secure and Efficient Participant Authentication—Application to Mobile E-Voting

    With Popularity of smart phones, more and more users tend to use them in e-voting activities. However, mobile devices has weak computing power and...
    Conference paper 2022
  10. DLchain: Blockchain with Deep Learning as Proof-of-Useful-Work

    Blockchains based on Proof-of-Work can maintain a distributed ledger with a high security guarantee but also lead to severe energy waste due to the...
    Changhao Chenli, Boyang Li, Taeho Jung in Services – SERVICES 2020
    Conference paper 2020
  11. Wild Swarms: Autonomous Drones for Environmental Monitoring and Protection

    In this paper, we present an example case study of how an autonomous swarm-based Multi-Robot System (MRS) could contribute to environmental...
    Fabrice Saffre, Hannu Karvonen, Hanno Hildmann in New Developments and Environmental Applications of Drones
    Conference paper 2024
  12. Lightweight Blockchain Logging for Data-Intensive Applications

    With the recent success of cryptocurrency, Blockchain’s design opens the door of building trustworthy distributed systems. A common paradigm is to...
    Yuzhe (Richard) Tang, Zihao **ng, ... Jianliang Xu in Financial Cryptography and Data Security
    Conference paper 2019
  13. End-to-End Test Coverage Metrics in Microservice Systems: An Automated Approach

    Microservice architecture gains momentum by fueling systems with cloud-native benefits, scalability, and decentralized evolution. However, new...
    Amr S. Abdelfattah, Tomas Cerny, ... Davide Taibi in Service-Oriented and Cloud Computing
    Conference paper 2023
  14. Comparison of Smart Contract Platforms from the Perspective of Developers

    Blockchain technologies promise to transform businesses by offering benefits like efficiency, transparency, fewer intermediaries, streamlined...
    Ammar Voloder, Monika di Angelo in Blockchain – ICBC 2023
    Conference paper 2023
  15. A trusted authentication scheme based on super SIM card for mobile office for industry 4.0

    With the rapid development and wide popularity of Internet technology, mobile application services have become an indispensable part of people's...

    Lingnan Kong, Zhendong Qian, ... Quanyuan Shao in Neural Computing and Applications
    Article 18 April 2023
  16. A Proof Assistant Based Formalisation of a Subset of Sequential Core Erlang

    We present a proof-assistant-based formalisation of a subset of Erlang, intended to serve as a base for proving refactorings correct. After...
    Péter Bereczky, Dániel Horpácsi, Simon Thompson in Trends in Functional Programming
    Conference paper 2020
  17. Decentralising the Internet of Medical Things with Distributed Ledger Technologies and Off-Chain Storages: A Proof of Concept

    The privacy issue limits the Internet of Medical Things. Medical information would enhance new medical studies, formulate new treatments, and deliver...
    Gioele Bigini, Valerio Freschi, ... Emanuele Lattanzi in Smart Objects and Technologies for Social Good
    Conference paper 2021
  18. Cloud-Based Secure Electronic Medical Data Sharing System Using Blockchain Technology (Simulation of a Ransomware Attack with OWASP)

    Attacks using ransomware are increasing, putting current healthcare institutions and other crucial infrastructure at risk. The current healthcare...
    Conference paper 2024
  19. Monitoring

    What are some of the most important features any new Linux system must have before it can be accepted into your organization's production or live...
    Chapter 2022
  20. Enhanced Pin Entry Mechanism for ATM Machine by Defending Shoulder Surfing Attacks

    Passwords and extraordinary recognizable proof numbers (PINs) are critical and notable strategies for confirmation found in many gadgets, including...
    Yogesh Kisan Mali, Vijay U. Rathod, ... Tushar Waykole in Cyber Security and Digital Forensics
    Conference paper 2024
Did you find what you were looking for? Share feedback.