We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 84 results
  1. Making Epidemiological and Clinical Studies FAIR Using the Example of COVID-19

    FAIRification of personal health data is of utmost importance to improve health research and political as well as medical decision-making, which...

    Iris Pigeot, Wolfgang Ahrens, ... Carsten Oliver Schmidt in Datenbank-Spektrum
    Article Open access 03 June 2024
  2. The History of Games for (Quantum) Computers

    Computer games are not just one application of computers, they are a multitude. A wide variety of computational tasks are combined, all running as...
    Chapter 2022
  3. Resisting Cinematographic Mechanism

    This chapter turns to the challenges posed for human identity by an increasingly pervasive and mechanised early twentieth century arts and...
    Megan Richardson in The Right to Privacy 1914–1948
    Chapter 2023
  4. Der Blonde Eckbert - A Serious Game Interpretation of the Eponymous Romantic Fairy Tale

    Literature-based sciences deal with plenty of great stories. As a combination of traditional knowledge transfer methods in the humanities and newer...
    Kevin Körner, Anna Katharina Turba in Games and Learning Alliance
    Conference paper 2021
  5. Principles – Management Services

    In the service-oriented enterprise, management is about what the enterprise knows, how it thinks, and how it decides. Although the details will...
    Chapter 2023
  6. Questions and Appraisal of Curiosity

    Questions not answers drive innovative thinking. Yet pressure to produce answers often obscures the need to find questions that generate inquiry. To...
    Melvin Freestone, Jon Mason in Design, Learning, and Innovation
    Conference paper 2022
  7. Becoming an Activist, Becoming a Researcher

    In this chapter, I reflect on my own career and in particular the challenges I faced as, firstly, an activist and, secondly, an academic. The journey...
    Debora de Castro Leal in Torn Many Ways
    Chapter 2023
  8. Towards a More Reproducible Biomedical Research Environment: Endorsement and Adoption of the FAIR Principles

    The FAIR guiding Principles for scientific data management and stewardship are a fundamental enabler for digital transformation and transparent...
    Alina Trifan, José Luís Oliveira in Biomedical Engineering Systems and Technologies
    Conference paper 2020
  9. Construction of  \(4 \times 4\) Lightweight Low-Latency Involutory MDS Matrices

    As the demand for lightweight cryptographic solutions continues to rise, the need for cryptography applications on devices with limited resources...
    Zheng Zhao, Qun Liu, ... Meiqin Wang in Applied Cryptography and Network Security Workshops
    Conference paper 2024
  10. Philosophical underpinnings of digital citizenship through a postdigital lens: Implications for teacher educators’ professional digital competence

    Embedded in society, digital infrastructure has changed citizens’ lives. Young people therefore need to develop digital competence and digital...

    Article Open access 04 July 2023
  11. An enhanced sea-horse optimizer for solving global problems and cluster head selection in wireless sensor networks

    An efficient variant of the recent sea horse optimizer (SHO) called SHO-OBL is presented, which incorporates the opposition-based learning (OBL)...

    Essam H. Houssein, Mohammed R. Saad, ... Hassan Shaban in Cluster Computing
    Article Open access 01 April 2024
  12. Challenge for Society of Scale and Speed of Technological Change

    Let us imagine that it is 1895. Telegraphy and telephony are well established. Common forms of transportation include ships, canals, railroads,...
    Chapter 2020
  13. Usability Dimensions of Simulated Detectors for Improvised Explosive Devices

    Buried explosives, such as Improvised Explosive Devices (IEDs), are a threat to operations in the military. This challenge is compounded by limits in...
    Crystal Maraj, Jonathan Hurter, ... Latika “Bonnie” Eifert in Adaptive Instructional Systems
    Conference paper 2020
  14. Construction of lightweight involutory MDS matrices

    In this paper, we propose an efficient method to find lightweight involutory MDS matrices. To obtain involutory matrices, we give a necessary and...

    Yumeng Yang, **angyong Zeng, Shi Wang in Designs, Codes and Cryptography
    Article 05 May 2021
  15. Institute Resilience Through Detection, Response, and Recovery

    Cyber-resilience is the ability to withstand and recover from inevitable risks materializing. Businesses should become more resilient by identifying...
    Chapter Open access 2020
  16. Preimage Analysis of the Maelstrom-0 Hash Function

    Maelstrom-0 is the second member of a family of AES-based hash functions whose designs are pioneered by Paulo Baretto and Vincent Rijmen. According...
    Conference paper 2015
  17. Direct Constructions of (Involutory) MDS Matrices from Block Vandermonde and Cauchy-Like Matrices

    MDS matrices are important components in the design of linear diffusion layers of many block ciphers and hash functions. Recently, there have been a...
    Qiu** Li, Baofeng Wu, Zhuojun Liu in Arithmetic of Finite Fields
    Conference paper 2018
  18. An improved framework for authorship identification in online messages

    The authorship identification will determine the likelihood of the writing produced, by an author, by means of examining the other writings. The...

    L. Srinivasan, C. Nalini in Cluster Computing
    Article 28 December 2017
  19. Transitions in human–computer interaction: from data embodiment to experience capitalism

    This article develops a critical theory of human–computer interaction (critical HCI) intended to test some of the assumptions and omissions made in...

    Tony D. Sampson in AI & SOCIETY
    Article 05 February 2018
Did you find what you were looking for? Share feedback.